Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MX-6240N_20241120_124324.exe

Overview

General Information

Sample name:MX-6240N_20241120_124324.exe
Analysis ID:1559407
MD5:6f25d9983d50a944a1821f2eb9b1eec7
SHA1:e05483b06f7bb9401c9b2b7f707d33607e7ece7e
SHA256:ca8b529cb0b693f6ff0dfe104fd063c4c161c572980dacd2d6d714a84dcfb03e
Tags:exeuser-lowmal3
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • MX-6240N_20241120_124324.exe (PID: 4348 cmdline: "C:\Users\user\Desktop\MX-6240N_20241120_124324.exe" MD5: 6F25D9983D50A944A1821F2EB9B1EEC7)
    • RegSvcs.exe (PID: 880 cmdline: "C:\Users\user\Desktop\MX-6240N_20241120_124324.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "bezelety.top", "Username": "procode@bezelety.top", "Password": "IxF(..bSed6k                    "}
SourceRuleDescriptionAuthorStrings
00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x334bf:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x33531:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x335bb:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x3364d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x336b7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x33729:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x337bf:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x3384f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000006.00000002.2529230665.0000000002578000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 8 entries
          SourceRuleDescriptionAuthorStrings
          0.2.MX-6240N_20241120_124324.exe.3290000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.MX-6240N_20241120_124324.exe.3290000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.MX-6240N_20241120_124324.exe.3290000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x316bf:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x31731:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x317bb:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x3184d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x318b7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x31929:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x319bf:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x31a4f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              6.2.RegSvcs.exe.550000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                6.2.RegSvcs.exe.550000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 4 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 194.36.191.196, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 880, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49700
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 6.2.RegSvcs.exe.550000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "bezelety.top", "Username": "procode@bezelety.top", "Password": "IxF(..bSed6k "}
                  Source: MX-6240N_20241120_124324.exeReversingLabs: Detection: 28%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: MX-6240N_20241120_124324.exeJoe Sandbox ML: detected
                  Source: MX-6240N_20241120_124324.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: MX-6240N_20241120_124324.exe, 00000000.00000003.1278177656.0000000003750000.00000004.00001000.00020000.00000000.sdmp, MX-6240N_20241120_124324.exe, 00000000.00000003.1279721255.00000000038F0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: MX-6240N_20241120_124324.exe, 00000000.00000003.1278177656.0000000003750000.00000004.00001000.00020000.00000000.sdmp, MX-6240N_20241120_124324.exe, 00000000.00000003.1279721255.00000000038F0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00336CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00336CA9
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003360DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_003360DD
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003363F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_003363F9
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0033EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0033EB60
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0033F56F FindFirstFileW,FindClose,0_2_0033F56F
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0033F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0033F5FA
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00341B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00341B2F
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00341C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00341C8A
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00341F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00341F94
                  Source: global trafficTCP traffic: 192.168.2.7:49700 -> 194.36.191.196:587
                  Source: Joe Sandbox ViewIP Address: 194.36.191.196 194.36.191.196
                  Source: Joe Sandbox ViewIP Address: 194.36.191.196 194.36.191.196
                  Source: Joe Sandbox ViewASN Name: HSAE HSAE
                  Source: global trafficTCP traffic: 192.168.2.7:49700 -> 194.36.191.196:587
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00344EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00344EB5
                  Source: global trafficDNS traffic detected: DNS query: bezelety.top
                  Source: RegSvcs.exe, 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bezelety.top
                  Source: RegSvcs.exe, 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.0000000000722000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2531273111.00000000059E0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2528213455.0000000000790000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.00000000006E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
                  Source: RegSvcs.exe, 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.0000000000722000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2531273111.00000000059E0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2528213455.0000000000790000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.00000000006E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                  Source: RegSvcs.exe, 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.0000000000722000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2531273111.00000000059E0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.00000000006E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: RegSvcs.exe, 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.0000000000722000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2531273111.00000000059E0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.00000000006E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: MX-6240N_20241120_124324.exe, 00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527426389.0000000000552000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, umlRMRbjNqD.cs.Net Code: _99C
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00346B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00346B0C
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00346D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00346D07
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00346B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00346B0C
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00332B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00332B37

                  System Summary

                  barindex
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 6.2.RegSvcs.exe.550000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: This is a third-party compiled AutoIt script.0_2_002F3D19
                  Source: MX-6240N_20241120_124324.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: MX-6240N_20241120_124324.exe, 00000000.00000000.1254519433.000000000039E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7301428e-a
                  Source: MX-6240N_20241120_124324.exe, 00000000.00000000.1254519433.000000000039E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: 2SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_8ade7c44-7
                  Source: MX-6240N_20241120_124324.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_bdb2fdb6-b
                  Source: MX-6240N_20241120_124324.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d7917d29-6
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00336606: CreateFileW,DeviceIoControl,CloseHandle,0_2_00336606
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0032ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_0032ACC5
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003379D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_003379D3
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0031B0430_2_0031B043
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003032000_2_00303200
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00303B700_2_00303B70
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0032410F0_2_0032410F
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003102A40_2_003102A4
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0032038E0_2_0032038E
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_002FE3E30_2_002FE3E3
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0032467F0_2_0032467F
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003106D90_2_003106D9
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0035AACE0_2_0035AACE
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00324BEF0_2_00324BEF
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0031CCC10_2_0031CCC1
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_002F6F070_2_002F6F07
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_002FAF500_2_002FAF50
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0030B11F0_2_0030B11F
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0031D1B90_2_0031D1B9
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003531BC0_2_003531BC
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0031123A0_2_0031123A
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0032724D0_2_0032724D
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_002F93F00_2_002F93F0
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003313CA0_2_003313CA
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0030F5630_2_0030F563
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_002F96C00_2_002F96C0
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0033B6CC0_2_0033B6CC
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_002F77B00_2_002F77B0
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003279C90_2_003279C9
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0030FA570_2_0030FA57
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_002F9B600_2_002F9B60
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_002F7D190_2_002F7D19
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0030FE6F0_2_0030FE6F
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00319ED00_2_00319ED0
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_002F7FA30_2_002F7FA3
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00FC86680_2_00FC8668
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_023493786_2_02349378
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02344A986_2_02344A98
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02349B386_2_02349B38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02343E806_2_02343E80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0234CEC06_2_0234CEC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0234A26F6_2_0234A26F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_023441C86_2_023441C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_058CDD006_2_058CDD00
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_058CBCF06_2_058CBCF0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_058C3F486_2_058C3F48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_058C56D06_2_058C56D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_058C00406_2_058C0040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_058C8B906_2_058C8B90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_058C9AD86_2_058C9AD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_058C2AF86_2_058C2AF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_058C4FF06_2_058C4FF0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_058C32486_2_058C3248
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0234D2686_2_0234D268
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: String function: 0030EC2F appears 68 times
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: String function: 00316AC0 appears 42 times
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: String function: 0031F8A0 appears 35 times
                  Source: MX-6240N_20241120_124324.exe, 00000000.00000003.1280768215.0000000003A1D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs MX-6240N_20241120_124324.exe
                  Source: MX-6240N_20241120_124324.exe, 00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameb8a301b8-17ed-4a95-9a06-b5d07d034022.exe4 vs MX-6240N_20241120_124324.exe
                  Source: MX-6240N_20241120_124324.exe, 00000000.00000003.1273303172.0000000003873000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs MX-6240N_20241120_124324.exe
                  Source: MX-6240N_20241120_124324.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 6.2.RegSvcs.exe.550000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, v9Lsz.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, VFo.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, 5FJ0H20tobu.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, NtdoTGO.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, XBsYgp.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, AwxUa2Na.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, 19C9FfZ.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, 19C9FfZ.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, soCD8XkwU.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, soCD8XkwU.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@1/1
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0033CE7A GetLastError,FormatMessageW,0_2_0033CE7A
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0032AB84 AdjustTokenPrivileges,CloseHandle,0_2_0032AB84
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0032B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_0032B134
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0033E1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0033E1FD
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00336532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_00336532
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0034C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0034C18C
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_002F406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_002F406B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeFile created: C:\Users\user~1\AppData\Local\Temp\aut2B0F.tmpJump to behavior
                  Source: MX-6240N_20241120_124324.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: MX-6240N_20241120_124324.exeReversingLabs: Detection: 28%
                  Source: unknownProcess created: C:\Users\user\Desktop\MX-6240N_20241120_124324.exe "C:\Users\user\Desktop\MX-6240N_20241120_124324.exe"
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\MX-6240N_20241120_124324.exe"
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\MX-6240N_20241120_124324.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: MX-6240N_20241120_124324.exeStatic file information: File size 1228800 > 1048576
                  Source: MX-6240N_20241120_124324.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: MX-6240N_20241120_124324.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: MX-6240N_20241120_124324.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: MX-6240N_20241120_124324.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: MX-6240N_20241120_124324.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: MX-6240N_20241120_124324.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: MX-6240N_20241120_124324.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: MX-6240N_20241120_124324.exe, 00000000.00000003.1278177656.0000000003750000.00000004.00001000.00020000.00000000.sdmp, MX-6240N_20241120_124324.exe, 00000000.00000003.1279721255.00000000038F0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: MX-6240N_20241120_124324.exe, 00000000.00000003.1278177656.0000000003750000.00000004.00001000.00020000.00000000.sdmp, MX-6240N_20241120_124324.exe, 00000000.00000003.1279721255.00000000038F0000.00000004.00001000.00020000.00000000.sdmp
                  Source: MX-6240N_20241120_124324.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: MX-6240N_20241120_124324.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: MX-6240N_20241120_124324.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: MX-6240N_20241120_124324.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: MX-6240N_20241120_124324.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0030E01E LoadLibraryA,GetProcAddress,0_2_0030E01E
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0030288B push 66003023h; retn 0036h0_2_003028E1
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00316B05 push ecx; ret 0_2_00316B18
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00358111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00358111
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0030EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0030EB42
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0031123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0031123A
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeAPI/Special instruction interceptor: Address: FC828C
                  Source: MX-6240N_20241120_124324.exe, 00000000.00000002.1285882659.0000000000EFA000.00000004.00000020.00020000.00000000.sdmp, MX-6240N_20241120_124324.exe, 00000000.00000003.1255526565.0000000000EFA000.00000004.00000020.00020000.00000000.sdmp, MX-6240N_20241120_124324.exe, 00000000.00000003.1255401198.0000000000EFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7871Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1964Jump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeEvaded block: after key decisiongraph_0-93336
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-94260
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeAPI coverage: 4.6 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00336CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00336CA9
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003360DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_003360DD
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003363F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_003363F9
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0033EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0033EB60
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0033F56F FindFirstFileW,FindClose,0_2_0033F56F
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0033F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0033F5FA
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00341B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00341B2F
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00341C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00341C8A
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00341F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00341F94
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0030DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0030DDC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99546Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99218Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99107Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98780Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98671Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98452Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98343Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98125Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98015Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97793Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97622Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97425Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97311Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96981Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96859Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96750Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96640Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96529Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96421Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96312Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96202Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96093Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95984Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95546Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95327Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95217Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95109Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94999Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94665Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94453Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94343Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94125Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94015Jump to behavior
                  Source: RegSvcs.exe, 00000006.00000002.2531273111.00000000059E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeAPI call chain: ExitProcess graph end nodegraph_0-92990
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeAPI call chain: ExitProcess graph end nodegraph_0-93562
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00346AAF BlockInput,0_2_00346AAF
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_002F3D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_002F3D19
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00323920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00323920
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0030E01E LoadLibraryA,GetProcAddress,0_2_0030E01E
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00FC84F8 mov eax, dword ptr fs:[00000030h]0_2_00FC84F8
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00FC8558 mov eax, dword ptr fs:[00000030h]0_2_00FC8558
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00FC6EF8 mov eax, dword ptr fs:[00000030h]0_2_00FC6EF8
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0032A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0032A66C
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003181AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003181AC
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00318189 SetUnhandledExceptionFilter,0_2_00318189
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 3E1008Jump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0032B106 LogonUserW,0_2_0032B106
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_002F3D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_002F3D19
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0033411C SendInput,keybd_event,0_2_0033411C
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003374BB mouse_event,0_2_003374BB
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\MX-6240N_20241120_124324.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0032A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0032A66C
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003371FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_003371FA
                  Source: MX-6240N_20241120_124324.exeBinary or memory string: Shell_TrayWnd
                  Source: MX-6240N_20241120_124324.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_003165C4 cpuid 0_2_003165C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0034091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_0034091D
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0036B340 GetUserNameW,0_2_0036B340
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00321E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00321E8E
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0030DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0030DDC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.RegSvcs.exe.550000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2529230665.0000000002578000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2527426389.0000000000552000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2529230665.0000000002501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: MX-6240N_20241120_124324.exe PID: 4348, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 880, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: MX-6240N_20241120_124324.exeBinary or memory string: WIN_81
                  Source: MX-6240N_20241120_124324.exeBinary or memory string: WIN_XP
                  Source: MX-6240N_20241120_124324.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
                  Source: MX-6240N_20241120_124324.exeBinary or memory string: WIN_XPe
                  Source: MX-6240N_20241120_124324.exeBinary or memory string: WIN_VISTA
                  Source: MX-6240N_20241120_124324.exeBinary or memory string: WIN_7
                  Source: MX-6240N_20241120_124324.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.RegSvcs.exe.550000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2527426389.0000000000552000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2529230665.0000000002501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: MX-6240N_20241120_124324.exe PID: 4348, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 880, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.RegSvcs.exe.550000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.MX-6240N_20241120_124324.exe.3290000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2529230665.0000000002578000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2527426389.0000000000552000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2529230665.0000000002501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: MX-6240N_20241120_124324.exe PID: 4348, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 880, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_00348C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00348C4F
                  Source: C:\Users\user\Desktop\MX-6240N_20241120_124324.exeCode function: 0_2_0034923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_0034923B
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts3
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  111
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model111
                  Input Capture
                  1
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets341
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  11
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials121
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  MX-6240N_20241120_124324.exe29%ReversingLabsWin32.Trojan.AutoitInject
                  MX-6240N_20241120_124324.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://bezelety.top0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  bezelety.top
                  194.36.191.196
                  truetrue
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://r10.o.lencr.org0#RegSvcs.exe, 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.0000000000722000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2531273111.00000000059E0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2528213455.0000000000790000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.00000000006E7000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://account.dyn.com/MX-6240N_20241120_124324.exe, 00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527426389.0000000000552000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        http://x1.c.lencr.org/0RegSvcs.exe, 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.0000000000722000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2531273111.00000000059E0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.00000000006E7000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://x1.i.lencr.org/0RegSvcs.exe, 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.0000000000722000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2531273111.00000000059E0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.00000000006E7000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://bezelety.topRegSvcs.exe, 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://r10.i.lencr.org/0RegSvcs.exe, 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.0000000000722000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2531273111.00000000059E0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2528213455.0000000000790000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2527825335.00000000006E7000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              194.36.191.196
                              bezelety.topNetherlands
                              60117HSAEtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1559407
                              Start date and time:2024-11-20 14:02:11 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 46s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:13
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:MX-6240N_20241120_124324.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/2@1/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 59
                              • Number of non-executed functions: 289
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: MX-6240N_20241120_124324.exe
                              TimeTypeDescription
                              08:03:10API Interceptor69x Sleep call for process: RegSvcs.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              194.36.191.196http://theclearinghouseus.orgGet hashmaliciousUnknownBrowse
                              • theclearinghouseus.org/www.theclearinghouse.org/connected-banking.html
                              gqtya.ps1Get hashmaliciousUnknownBrowse
                              • udr-offdips.com/buy/
                              http://store.avast.com/store?SiteID=avast&Action=DisplayRedirectCustomPage&Locale=en_US&v=1&t=event&tid=UA-58120669-65&cid=725399894.1568213989&ec=Emailing_Digital%20River&aip=1&cm10=1&ds=Avast&ul=en_US&cs=Digital%20River&cm=email&cd2=Paid&cd3=725399894.1568213989&cd4=Business&cd5=BMG-00-001-36-AR&cd7=13306019910&cd6=22895593139&cd8=0&cd9=4871168000&cd10=USD&cd11=44&cd12=1659005853297&ea=Click&el=http://0gjysc.wildlifewalkabout.com/am9lbC5uYXNzaWZAYXJuLmFlGet hashmaliciousUnknownBrowse
                              • 0gjysc.wildlifewalkabout.com/am9lbC5uYXNzaWZAYXJuLmFl
                              #U6025-146102220896 BSIU2505935-Remitance Advise.xlsxGet hashmaliciousFormBookBrowse
                              • www.firstflightmdelivery.services/inug/?LJBd06wP=my5vzthd/gf6h+YfXGHF51EmCUBukXLQvdzfbkPp7mscRjHMsb7qcEfg2/kZIm7kG7WZ0g==&-ZcxnF=8p74g4BxA
                              jun.exeGet hashmaliciousAZORultBrowse
                              • squerad.com/cgi-sys/suspendedpage.cgi
                              Player offer.exeGet hashmaliciousAZORultBrowse
                              • squerad.com/frank/index.php
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              bezelety.topProforma Invoice NOCAP PLASTIK AMBALA.exeGet hashmaliciousAgentTeslaBrowse
                              • 194.36.191.196
                              RFQ SN00954666 for prosjekt CMC 40 fot container.exeGet hashmaliciousAgentTeslaBrowse
                              • 194.36.191.196
                              SecuriteInfo.com.Trojan.AutoIt.1430.29949.19414.exeGet hashmaliciousAgentTeslaBrowse
                              • 194.36.191.196
                              RFQ X2024176-K24033-2024.08.06.exeGet hashmaliciousAgentTeslaBrowse
                              • 194.36.191.196
                              z40Listadeprodu.exeGet hashmaliciousAgentTeslaBrowse
                              • 194.36.191.196
                              NOTx2cPVpc.exeGet hashmaliciousAgentTeslaBrowse
                              • 194.36.191.196
                              JsAFKyWHSg.exeGet hashmaliciousAgentTeslaBrowse
                              • 194.36.191.196
                              dAXlKixB1s.exeGet hashmaliciousAgentTeslaBrowse
                              • 194.36.191.196
                              qtP2NGoOUJ.exeGet hashmaliciousAgentTeslaBrowse
                              • 194.36.191.196
                              SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.16327.12658.exeGet hashmaliciousAgentTeslaBrowse
                              • 194.36.191.196
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              HSAEJGWfssorui.dllGet hashmaliciousDanaBotBrowse
                              • 185.106.123.228
                              ElTZP4yjRG.dllGet hashmaliciousDanaBotBrowse
                              • 185.106.123.228
                              H6PtrbXJ9Q.dllGet hashmaliciousDanaBotBrowse
                              • 185.106.123.228
                              Mj1o4aZG6y.dllGet hashmaliciousDanaBotBrowse
                              • 185.106.123.228
                              OYGqoSlvmi.dllGet hashmaliciousDanaBotBrowse
                              • 185.106.123.228
                              5vcrbMCVE7.dllGet hashmaliciousDanaBotBrowse
                              • 185.106.123.228
                              OD195KrzCl.dllGet hashmaliciousDanaBotBrowse
                              • 185.106.123.228
                              VKxD9FFAj0.dllGet hashmaliciousDanaBotBrowse
                              • 185.106.123.228
                              c6n1aEdVje.dllGet hashmaliciousUnknownBrowse
                              • 185.106.123.228
                              c6n1aEdVje.dllGet hashmaliciousUnknownBrowse
                              • 185.106.123.228
                              No context
                              No context
                              Process:C:\Users\user\Desktop\MX-6240N_20241120_124324.exe
                              File Type:data
                              Category:modified
                              Size (bytes):240128
                              Entropy (8bit):6.541468216945984
                              Encrypted:false
                              SSDEEP:6144:gy8nqMr3lXcsAQxlHDgVgrj+JTiuALWTtdGW82np4fzyqmgF:ByYfBtdi2EeqmK
                              MD5:61997641BD35B7107310198136908D5F
                              SHA1:47A0A3AAFEE37EEBCBCE6CEC8B533FA4935567F2
                              SHA-256:3C80D39256D3A9032D9C492D860F267592D6E6D0D0039F47FB77A22EC07506EB
                              SHA-512:664F425BE47383A5A35E0920BE58F4D3D846AC1C33500841B2C61A53FE4A6D09D3D9DB9907CD8DBBB653168549D9477D089F2E151B5434B9FBED568834B4BA4D
                              Malicious:false
                              Reputation:low
                              Preview:|..Z[XET0VLU..1O.ZXXET4V.URT1OJZXXET4VLURT1OJZXXET4VLURT1OJZ.XET:I.[R.8.k.Y..u`>%&r$C -(95e7U8":&tS*j(-6e=Zv...t\ .?vUH^.VLURT1O..XX.U7V..11OJZXXET.VNTYU:OJ.[XE\4VLURT?.IZXxET4.OURTqOJzXXEV4VHURT1OJZ\XET4VLURT5OJXXXET4VNU..1OZZXHET4V\URD1OJZXXUT4VLURT1OJZ..FTcVLUR.2O._XXET4VLURT1OJZXXET4.OU^T1OJZXXET4VLURT1OJZXXET4VLURT1OJZXXET4VLURT1OJZXXET4vLUZT1OJZXXET4VDuRTyOJZXXET4VLU| T7>ZXXQ.7VLuRT1.IZXZET4VLURT1OJZXXeT46b'!&ROJZ.]ET4.OURR1OJ.[XET4VLURT1OJZ.XE..$)9=71OFZXXE.7VLWRT1.IZXXET4VLURT1O.ZX.ET4VLURT1OJZXXET..OURT1O.ZXXGT1V..PT..KZ[XET5VLSRT1OJZXXET4VLURT1OJZXXET4VLURT1OJZXXET4VLURT1OJZE.....k.).E(].~.3.U..A.6..W.P.OB....<....b!2..U.[...Q...#.]W-0....}4?'B=.#.@+.E....km!...I$."...Jd.;Tp.f...~f...Z&.i.....&;Yx-%"8Ta.;>97=.T.TRT1O.......%-...LEDlJ=....fFI....;T4V(URTCOJZ9XETsVLU=T1O$ZXX;T4V2URTwOJZ.XET.VLUwT1O'ZXXaT4V2URT.2EU..=G..URT1O...h.9.....c...l).;.Vn...0....]..[\.;....D.3..#.'Sq.iHK\\]GS0U@h\...{Z\AQ6QHV^i?....y.r..u..@...".(4VLURT.OJ.XXE.V.URT.O.Z..ET4.U.T.O...X
                              Process:C:\Users\user\Desktop\MX-6240N_20241120_124324.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):140906
                              Entropy (8bit):7.878920381160145
                              Encrypted:false
                              SSDEEP:3072:WOGRBe8QM5hf947yL6QSenV/kTsD9xHFk/oj4n3PST/tNBOiRoFlJFhfjz:SBIM5D5LBSenfD9xl1jw3Ytu1/Bz
                              MD5:0E958749FEF4B21EB5F4BA1DC96F19F9
                              SHA1:E4401D5C6A8BB4BC7C58A03FBF21F4F4E4F235EF
                              SHA-256:195909E534B0A7466350C61108B090BB22ED453DF4965C85D134D69558264420
                              SHA-512:242780EABA9A358F494E08316D56AE28E8DFB32708B4332FD2DF68E1E18AD290A312E2173EC305B10FF0025AC4398B1A4042DF7CEBAB28760D63B5D58ACBF1B9
                              Malicious:false
                              Reputation:low
                              Preview:EA06.....E{U..b.T.U..]n.cO.V..........}(.;4.....N.?j.K.8.Z.U..".`.Id.)%.A-.Nf.Y.Vq".I..9U.Q-.Yg..."5..W$....H.D......+......sf .Z.U..J.VuO.~.&....'..Mj.x.~2.....O.^.....H...p.ksZ}*..Q.uV%...U.. .9.UjT@.,U@1;..Q..0..)2..+...6.U...~...5.U...v.u.U/ .].H*.y..qQ.......c...+@.....4.X...5H.8.W@?3R..?.....1X..#RIL.{7.....N..P....zH.....V#@........i. ..T.....S.....SZ.2.R.....On...Z.R.}.Q]..s=.WW..p3m$V...ni....3..c..Lv..!.w`.\un...i.=.s=#..j......./.I...=.....^....B0.l.%..Rd.......Y8s....f.....6....V..N....d...[%.N*....}9..q.M.P.i..x...g...c0..2.D.R..,..G..Q.1..+o...b...B...N@4....=.8$.....2....-..@......'.., ...L..^..[=..v`!U.u.s.:_.j....3.[d..;...v&a..f`.._v.\.N...#MD.k&p....'..cV.E..\...s....\......j.A..4..z.?.m4x.....]zx.5....B.].@..9..Wh. .m*.....v;.2.[gU......b...Uf....A^..'..EQ.A 0h$F.8...p1T.U..H.9.U,.j.Rwe.I`U.-C.C.:*...!&..&.+ ....DkU..6.@*.*.2R.8V..y.Z.W.j...Uj.+..&.....8..+.9.#.|.U.2.U>.^.D.......S..5f.... ..=RcE..*.X\.QM..*..-..X.S.x.6..W4.
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.618966075504826
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:MX-6240N_20241120_124324.exe
                              File size:1'228'800 bytes
                              MD5:6f25d9983d50a944a1821f2eb9b1eec7
                              SHA1:e05483b06f7bb9401c9b2b7f707d33607e7ece7e
                              SHA256:ca8b529cb0b693f6ff0dfe104fd063c4c161c572980dacd2d6d714a84dcfb03e
                              SHA512:a3530347da2c3990e604644b4ad8a732f7dda9bda99c95f2d0ec00d2c1a5d9122d972efa2ba7e731e740f76173a561a1c47349ce7bedf9ae7b50b777cb14ed66
                              SSDEEP:24576:otb20pkaCqT5TBWgNQ7asjTZxNSz33CF6A:xVg5tQ7asjTZx8W5
                              TLSH:8F45AE1367DD8260CB715373BA267B016E7B7C2569B0F55B1F98383CAB731A2021E663
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                              Icon Hash:043150858083204d
                              Entrypoint:0x425f74
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                              Time Stamp:0x673DC8DA [Wed Nov 20 11:32:42 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:1
                              File Version Major:5
                              File Version Minor:1
                              Subsystem Version Major:5
                              Subsystem Version Minor:1
                              Import Hash:3d95adbf13bbe79dc24dccb401c12091
                              Instruction
                              call 00007F5C05628CBFh
                              jmp 00007F5C0561BCD4h
                              int3
                              int3
                              push edi
                              push esi
                              mov esi, dword ptr [esp+10h]
                              mov ecx, dword ptr [esp+14h]
                              mov edi, dword ptr [esp+0Ch]
                              mov eax, ecx
                              mov edx, ecx
                              add eax, esi
                              cmp edi, esi
                              jbe 00007F5C0561BE5Ah
                              cmp edi, eax
                              jc 00007F5C0561C1BEh
                              bt dword ptr [004C0158h], 01h
                              jnc 00007F5C0561BE59h
                              rep movsb
                              jmp 00007F5C0561C16Ch
                              cmp ecx, 00000080h
                              jc 00007F5C0561C024h
                              mov eax, edi
                              xor eax, esi
                              test eax, 0000000Fh
                              jne 00007F5C0561BE60h
                              bt dword ptr [004BA370h], 01h
                              jc 00007F5C0561C330h
                              bt dword ptr [004C0158h], 00000000h
                              jnc 00007F5C0561BFFDh
                              test edi, 00000003h
                              jne 00007F5C0561C00Eh
                              test esi, 00000003h
                              jne 00007F5C0561BFEDh
                              bt edi, 02h
                              jnc 00007F5C0561BE5Fh
                              mov eax, dword ptr [esi]
                              sub ecx, 04h
                              lea esi, dword ptr [esi+04h]
                              mov dword ptr [edi], eax
                              lea edi, dword ptr [edi+04h]
                              bt edi, 03h
                              jnc 00007F5C0561BE63h
                              movq xmm1, qword ptr [esi]
                              sub ecx, 08h
                              lea esi, dword ptr [esi+08h]
                              movq qword ptr [edi], xmm1
                              lea edi, dword ptr [edi+08h]
                              test esi, 00000007h
                              je 00007F5C0561BEB5h
                              bt esi, 03h
                              jnc 00007F5C0561BF08h
                              movdqa xmm1, dqword ptr [esi+00h]
                              Programming Language:
                              • [ C ] VS2008 SP1 build 30729
                              • [IMP] VS2008 SP1 build 30729
                              • [ASM] VS2012 UPD4 build 61030
                              • [RES] VS2012 UPD4 build 61030
                              • [LNK] VS2012 UPD4 build 61030
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x62e24.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1270000x6c4c.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0xc40000x62e240x63000d560c6bf303f838782d25614e98d297cFalse0.6016019570707071data6.03758829648141IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x1270000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0xc44580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                              RT_ICON0xc45800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                              RT_ICON0xc46a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                              RT_ICON0xc47d00x2ec28Device independent bitmap graphic, 181 x 512 x 32, image size 185344, resolution 5905 x 5905 px/mEnglishGreat Britain0.1974854851509962
                              RT_MENU0xf33f80x50dataEnglishGreat Britain0.9
                              RT_STRING0xf34480x594dataEnglishGreat Britain0.3333333333333333
                              RT_STRING0xf39dc0x68adataEnglishGreat Britain0.2747909199522103
                              RT_STRING0xf40680x490dataEnglishGreat Britain0.3715753424657534
                              RT_STRING0xf44f80x5fcdataEnglishGreat Britain0.3087467362924282
                              RT_STRING0xf4af40x65cdataEnglishGreat Britain0.34336609336609336
                              RT_STRING0xf51500x466dataEnglishGreat Britain0.3605683836589698
                              RT_STRING0xf55b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                              RT_RCDATA0xf57100x31237data1.0003527582215024
                              RT_GROUP_ICON0x1269480x14dataEnglishGreat Britain1.25
                              RT_GROUP_ICON0x12695c0x14dataEnglishGreat Britain1.25
                              RT_GROUP_ICON0x1269700x14dataEnglishGreat Britain1.15
                              RT_GROUP_ICON0x1269840x14dataEnglishGreat Britain1.25
                              RT_VERSION0x1269980xdcdataEnglishGreat Britain0.6181818181818182
                              RT_MANIFEST0x126a740x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                              DLLImport
                              WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                              VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                              COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                              WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                              PSAPI.DLLGetProcessMemoryInfo
                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                              USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                              UxTheme.dllIsThemeActive
                              KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                              USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                              GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                              COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                              ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                              OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                              Language of compilation systemCountry where language is spokenMap
                              EnglishGreat Britain
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 20, 2024 14:03:12.593630075 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:12.715466976 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:12.715564966 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:14.074117899 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:14.075052977 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:14.194653988 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:14.495302916 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:14.497561932 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:14.617355108 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:14.953675985 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:14.960860968 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:15.082303047 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:15.422173023 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:15.422708988 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:15.422801971 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:15.422811985 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:15.472106934 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:15.676172018 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:15.722106934 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:15.736053944 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:15.859086990 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:16.308247089 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:16.327007055 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:16.448404074 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:16.746992111 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:16.752276897 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:16.872440100 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:17.187350035 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:17.188647985 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:17.308828115 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:17.644017935 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:17.644534111 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:17.765458107 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:18.065582037 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:18.066121101 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:18.185708046 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:18.495357990 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:18.495662928 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:18.618063927 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:18.915771008 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:18.916594982 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:18.916676044 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:18.916707039 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:18.916734934 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:03:19.036911011 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:19.036928892 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:19.036952972 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:19.037003040 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:19.715456009 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:03:19.769001961 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:04:51.942257881 CET49700587192.168.2.7194.36.191.196
                              Nov 20, 2024 14:04:52.065052032 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:04:52.372476101 CET58749700194.36.191.196192.168.2.7
                              Nov 20, 2024 14:04:52.377433062 CET49700587192.168.2.7194.36.191.196
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 20, 2024 14:03:11.923733950 CET6521553192.168.2.71.1.1.1
                              Nov 20, 2024 14:03:12.582353115 CET53652151.1.1.1192.168.2.7
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Nov 20, 2024 14:03:11.923733950 CET192.168.2.71.1.1.10x3900Standard query (0)bezelety.topA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Nov 20, 2024 14:03:12.582353115 CET1.1.1.1192.168.2.70x3900No error (0)bezelety.top194.36.191.196A (IP address)IN (0x0001)false
                              TimestampSource PortDest PortSource IPDest IPCommands
                              Nov 20, 2024 14:03:14.074117899 CET58749700194.36.191.196192.168.2.7220-hosting1.nl.hostsailor.com ESMTP Exim 4.96.2 #2 Wed, 20 Nov 2024 14:03:13 +0100
                              220-We do not authorize the use of this system to transport unsolicited,
                              220 and/or bulk e-mail.
                              Nov 20, 2024 14:03:14.075052977 CET49700587192.168.2.7194.36.191.196EHLO 390120
                              Nov 20, 2024 14:03:14.495302916 CET58749700194.36.191.196192.168.2.7250-hosting1.nl.hostsailor.com Hello 390120 [8.46.123.75]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-STARTTLS
                              250 HELP
                              Nov 20, 2024 14:03:14.497561932 CET49700587192.168.2.7194.36.191.196STARTTLS
                              Nov 20, 2024 14:03:14.953675985 CET58749700194.36.191.196192.168.2.7220 TLS go ahead

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:08:03:06
                              Start date:20/11/2024
                              Path:C:\Users\user\Desktop\MX-6240N_20241120_124324.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\MX-6240N_20241120_124324.exe"
                              Imagebase:0x2f0000
                              File size:1'228'800 bytes
                              MD5 hash:6F25D9983D50A944A1821F2EB9B1EEC7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1286430768.0000000003290000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              Reputation:low
                              Has exited:true

                              Target ID:6
                              Start time:08:03:07
                              Start date:20/11/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\MX-6240N_20241120_124324.exe"
                              Imagebase:0x180000
                              File size:45'984 bytes
                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2529230665.000000000254E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2529230665.0000000002578000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2527426389.0000000000552000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2527426389.0000000000552000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2529230665.0000000002501000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2529230665.0000000002501000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:4.1%
                                Dynamic/Decrypted Code Coverage:0.4%
                                Signature Coverage:9.5%
                                Total number of Nodes:2000
                                Total number of Limit Nodes:57
                                execution_graph 92866 369c06 92877 30d3be 92866->92877 92868 369c1c 92869 369c91 Mailbox 92868->92869 92958 2f1caa 49 API calls 92868->92958 92886 303200 92869->92886 92873 369c71 92875 369cc5 92873->92875 92959 33b171 48 API calls 92873->92959 92876 36a7ab Mailbox 92875->92876 92960 33cc5c 86 API calls 4 library calls 92875->92960 92878 30d3ca 92877->92878 92879 30d3dc 92877->92879 92961 2fdcae 50 API calls Mailbox 92878->92961 92881 30d3e2 92879->92881 92882 30d40b 92879->92882 92962 30f4ea 92881->92962 92971 2fdcae 50 API calls Mailbox 92882->92971 92885 30d3d4 92885->92868 92994 2fbd30 92886->92994 92888 303267 92890 3032f8 92888->92890 92891 36907a 92888->92891 92949 303628 92888->92949 93067 30c36b 86 API calls 92890->93067 93102 33cc5c 86 API calls 4 library calls 92891->93102 92894 3694df 92894->92949 93137 33cc5c 86 API calls 4 library calls 92894->93137 92895 303313 92895->92894 92947 3034eb _memcpy_s Mailbox 92895->92947 92895->92949 92999 2f2b7a 92895->92999 92897 3691fa 93117 33cc5c 86 API calls 4 library calls 92897->93117 92898 30c3c3 48 API calls 92898->92947 92902 3693c5 92907 2ffe30 335 API calls 92902->92907 92903 36926d 93121 33cc5c 86 API calls 4 library calls 92903->93121 92904 36909a 92904->92897 93103 2fd645 92904->93103 92909 369407 92907->92909 92909->92949 93126 2fd6e9 92909->93126 92911 369114 92924 369128 92911->92924 92933 369152 92911->92933 92912 369220 93118 2f1caa 49 API calls 92912->93118 92914 3033ce 92918 303465 92914->92918 92919 36945e 92914->92919 92914->92947 92926 30f4ea 48 API calls 92918->92926 93131 33c942 50 API calls 92919->93131 92921 369438 93130 33cc5c 86 API calls 4 library calls 92921->93130 92922 36923d 92927 369252 92922->92927 92928 36925e 92922->92928 93113 33cc5c 86 API calls 4 library calls 92924->93113 92936 30346c 92926->92936 93119 33cc5c 86 API calls 4 library calls 92927->93119 93120 33cc5c 86 API calls 4 library calls 92928->93120 92934 369177 92933->92934 92939 369195 92933->92939 93114 34f320 335 API calls 92934->93114 92943 30351f 92936->92943 93006 2fe8d0 92936->93006 92938 30f4ea 48 API calls 92938->92947 92940 36918b 92939->92940 93115 34f5ee 335 API calls 92939->93115 92940->92949 93116 30c2d6 48 API calls _memcpy_s 92940->93116 92946 303540 92943->92946 93132 2f6eed 92943->93132 92946->92949 92952 3694b0 92946->92952 92954 303585 92946->92954 92947->92898 92947->92902 92947->92903 92947->92904 92947->92921 92947->92938 92947->92943 92948 369394 92947->92948 92947->92949 93069 2fd9a0 53 API calls __cinit 92947->93069 93070 2fd8c0 53 API calls 92947->93070 93071 30c2d6 48 API calls _memcpy_s 92947->93071 93072 2ffe30 92947->93072 93122 34cda2 82 API calls Mailbox 92947->93122 93123 3380e3 53 API calls 92947->93123 93124 2fd764 55 API calls 92947->93124 93125 2fdcae 50 API calls Mailbox 92947->93125 92951 30f4ea 48 API calls 92948->92951 92957 303635 Mailbox 92949->92957 93101 33cc5c 86 API calls 4 library calls 92949->93101 92951->92902 93136 2fdcae 50 API calls Mailbox 92952->93136 92954->92894 92954->92949 92955 303615 92954->92955 93068 2fdcae 50 API calls Mailbox 92955->93068 92957->92875 92958->92873 92959->92869 92960->92876 92961->92885 92965 30f4f2 __calloc_impl 92962->92965 92964 30f50c 92964->92885 92965->92964 92966 30f50e std::exception::exception 92965->92966 92972 31395c 92965->92972 92986 316805 RaiseException 92966->92986 92968 30f538 92987 31673b 47 API calls _free 92968->92987 92970 30f54a 92970->92885 92971->92885 92973 3139d7 __calloc_impl 92972->92973 92983 313968 __calloc_impl 92972->92983 92993 317c0e 47 API calls __getptd_noexit 92973->92993 92974 313973 92974->92983 92988 3181c2 47 API calls 2 library calls 92974->92988 92989 31821f 47 API calls 8 library calls 92974->92989 92990 311145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 92974->92990 92977 31399b RtlAllocateHeap 92978 3139cf 92977->92978 92977->92983 92978->92965 92980 3139c3 92991 317c0e 47 API calls __getptd_noexit 92980->92991 92983->92974 92983->92977 92983->92980 92984 3139c1 92983->92984 92992 317c0e 47 API calls __getptd_noexit 92984->92992 92986->92968 92987->92970 92988->92974 92989->92974 92991->92984 92992->92978 92993->92978 92995 2fbd3f 92994->92995 92998 2fbd5a 92994->92998 93138 2fbdfa 92995->93138 92997 2fbd47 CharUpperBuffW 92997->92998 92998->92888 93000 2f2b8b 92999->93000 93001 36436a 92999->93001 93002 30f4ea 48 API calls 93000->93002 93003 2f2b92 93002->93003 93004 2f2bb3 93003->93004 93155 2f2bce 48 API calls 93003->93155 93004->92914 93007 2fe8f6 93006->93007 93064 2fe906 Mailbox 93006->93064 93009 2fed52 93007->93009 93007->93064 93008 33cc5c 86 API calls 93008->93064 93254 30e3cd 335 API calls 93009->93254 93011 2febdd 93011->92947 93013 2fed63 93013->93011 93015 2fed70 93013->93015 93014 2fe94c PeekMessageW 93014->93064 93256 30e312 335 API calls Mailbox 93015->93256 93017 36526e Sleep 93017->93064 93018 2fed77 LockWindowUpdate DestroyWindow GetMessageW 93018->93011 93021 2feda9 93018->93021 93019 2febc7 93019->93011 93255 2f2ff6 16 API calls 93019->93255 93023 3659ef TranslateMessage DispatchMessageW GetMessageW 93021->93023 93023->93023 93024 365a1f 93023->93024 93024->93011 93025 2fed21 PeekMessageW 93025->93064 93026 30f4ea 48 API calls 93026->93064 93027 2febf7 timeGetTime 93027->93064 93029 2f6eed 48 API calls 93029->93064 93030 365557 WaitForSingleObject 93032 365574 GetExitCodeProcess CloseHandle 93030->93032 93030->93064 93031 2fed3a TranslateMessage DispatchMessageW 93031->93025 93032->93064 93033 36588f Sleep 93059 365429 Mailbox 93033->93059 93035 2fedae timeGetTime 93257 2f1caa 49 API calls 93035->93257 93037 365733 Sleep 93037->93059 93040 365926 GetExitCodeProcess 93044 365952 CloseHandle 93040->93044 93045 36593c WaitForSingleObject 93040->93045 93041 2f2aae 311 API calls 93041->93064 93043 30dc38 timeGetTime 93043->93059 93044->93059 93045->93044 93045->93064 93046 365445 Sleep 93046->93064 93048 365432 Sleep 93048->93046 93049 358c4b 108 API calls 93049->93059 93050 2f2c79 107 API calls 93050->93059 93051 3659ae Sleep 93051->93064 93052 2f1caa 49 API calls 93052->93064 93057 2fd6e9 55 API calls 93057->93059 93058 2ffe30 311 API calls 93058->93064 93059->93040 93059->93043 93059->93046 93059->93048 93059->93049 93059->93050 93059->93051 93059->93057 93059->93064 93259 2fd7f7 93059->93259 93264 334cbe 49 API calls Mailbox 93059->93264 93265 2f1caa 49 API calls 93059->93265 93266 2fce19 93059->93266 93272 2f2aae 335 API calls 93059->93272 93273 34ccb2 50 API calls 93059->93273 93274 337a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 93059->93274 93275 336532 63 API calls 3 library calls 93059->93275 93062 303200 311 API calls 93062->93064 93064->93008 93064->93014 93064->93017 93064->93019 93064->93025 93064->93026 93064->93027 93064->93029 93064->93030 93064->93031 93064->93033 93064->93035 93064->93037 93064->93041 93064->93046 93064->93052 93064->93058 93064->93059 93064->93062 93065 2fce19 48 API calls 93064->93065 93066 2fd6e9 55 API calls 93064->93066 93156 2fef00 93064->93156 93161 2ff110 93064->93161 93226 3045e0 93064->93226 93243 30e244 93064->93243 93248 30dc5f 93064->93248 93253 2feed0 335 API calls Mailbox 93064->93253 93258 358d23 48 API calls 93064->93258 93065->93064 93066->93064 93067->92895 93068->92949 93069->92947 93070->92947 93071->92947 93073 2ffe50 93072->93073 93097 2ffe7e 93072->93097 93074 30f4ea 48 API calls 93073->93074 93074->93097 93075 310f0a 52 API calls __cinit 93075->93097 93076 30146e 93077 2f6eed 48 API calls 93076->93077 93099 2fffe1 93077->93099 93078 30f4ea 48 API calls 93078->93097 93079 2fd7f7 48 API calls 93079->93097 93081 300509 94371 33cc5c 86 API calls 4 library calls 93081->94371 93083 2f6eed 48 API calls 93083->93097 93085 36a246 93089 2f6eed 48 API calls 93085->93089 93086 301473 94370 33cc5c 86 API calls 4 library calls 93086->94370 93087 36a922 93087->92947 93089->93099 93091 36a873 93091->92947 93092 3297ed InterlockedDecrement 93092->93097 93093 36a30e 93093->93099 94368 3297ed InterlockedDecrement 93093->94368 93095 36a973 94372 33cc5c 86 API calls 4 library calls 93095->94372 93097->93075 93097->93076 93097->93078 93097->93079 93097->93081 93097->93083 93097->93085 93097->93086 93097->93092 93097->93093 93097->93095 93097->93099 93100 3015b5 93097->93100 94366 301820 335 API calls 2 library calls 93097->94366 94367 301d10 59 API calls Mailbox 93097->94367 93098 36a982 93099->92947 94369 33cc5c 86 API calls 4 library calls 93100->94369 93101->92957 93102->92895 93104 2fd654 93103->93104 93111 2fd67e 93103->93111 93105 2fd65b 93104->93105 93107 2fd6c2 93104->93107 93106 2fd666 93105->93106 93112 2fd6ab 93105->93112 94373 2fd9a0 53 API calls __cinit 93106->94373 93107->93112 94375 30dce0 53 API calls 93107->94375 93111->92911 93111->92912 93112->93111 94374 30dce0 53 API calls 93112->94374 93113->92949 93114->92940 93115->92940 93116->92897 93117->92949 93118->92922 93119->92949 93120->92949 93121->92949 93122->92947 93123->92947 93124->92947 93125->92947 93127 2fd6f4 93126->93127 93128 2fd71b 93127->93128 94376 2fd764 55 API calls 93127->94376 93128->92921 93130->92949 93131->92943 93133 2f6ef8 93132->93133 93134 2f6f00 93132->93134 94377 2fdd47 48 API calls _memcpy_s 93133->94377 93134->92946 93136->92894 93137->92949 93139 2fbe0d 93138->93139 93140 2fbe0a _memcpy_s 93138->93140 93141 30f4ea 48 API calls 93139->93141 93140->92997 93142 2fbe17 93141->93142 93144 30ee75 93142->93144 93146 30f4ea __calloc_impl 93144->93146 93145 31395c _W_store_winword 47 API calls 93145->93146 93146->93145 93147 30f50c 93146->93147 93148 30f50e std::exception::exception 93146->93148 93147->93140 93153 316805 RaiseException 93148->93153 93150 30f538 93154 31673b 47 API calls _free 93150->93154 93152 30f54a 93152->93140 93153->93150 93154->93152 93155->93004 93157 2fef1d 93156->93157 93158 2fef2f 93156->93158 93157->93064 93276 33cc5c 86 API calls 4 library calls 93158->93276 93160 3686f9 93160->93160 93162 2ff130 93161->93162 93164 2ffe30 335 API calls 93162->93164 93168 2ff199 93162->93168 93163 2ff3dd 93167 3687c8 93163->93167 93177 2ff3f2 93163->93177 93211 2ff431 Mailbox 93163->93211 93166 368728 93164->93166 93165 2ff595 93172 2fd7f7 48 API calls 93165->93172 93165->93211 93166->93168 93294 33cc5c 86 API calls 4 library calls 93166->93294 93297 33cc5c 86 API calls 4 library calls 93167->93297 93168->93163 93168->93165 93174 2fd7f7 48 API calls 93168->93174 93205 2ff229 93168->93205 93169 2ffe30 335 API calls 93169->93211 93173 3687a3 93172->93173 93296 310f0a 52 API calls __cinit 93173->93296 93179 368772 93174->93179 93175 33cc5c 86 API calls 93175->93211 93203 2ff418 93177->93203 93298 339af1 48 API calls 93177->93298 93178 368b1b 93193 368bcf 93178->93193 93194 368b2c 93178->93194 93295 310f0a 52 API calls __cinit 93179->93295 93180 2fd6e9 55 API calls 93180->93211 93182 2ff770 93187 368a45 93182->93187 93204 2ff77a 93182->93204 93184 368c53 93312 33cc5c 86 API calls 4 library calls 93184->93312 93185 368810 93299 34eef8 335 API calls 93185->93299 93186 2ffe30 335 API calls 93206 2ff6aa 93186->93206 93304 30c1af 48 API calls 93187->93304 93188 368b7e 93307 34e40a 335 API calls Mailbox 93188->93307 93309 33cc5c 86 API calls 4 library calls 93193->93309 93306 34f5ee 335 API calls 93194->93306 93195 368beb 93310 34bdbd 335 API calls Mailbox 93195->93310 93197 301b90 48 API calls 93197->93211 93202 368c00 93225 2ff537 Mailbox 93202->93225 93311 33cc5c 86 API calls 4 library calls 93202->93311 93203->93178 93203->93206 93203->93211 93277 301b90 93204->93277 93205->93163 93205->93165 93205->93203 93205->93211 93206->93182 93206->93186 93209 2ffce0 93206->93209 93206->93211 93206->93225 93208 368823 93208->93203 93210 36884b 93208->93210 93209->93225 93308 33cc5c 86 API calls 4 library calls 93209->93308 93300 34ccdc 48 API calls 93210->93300 93211->93169 93211->93175 93211->93180 93211->93184 93211->93188 93211->93195 93211->93197 93211->93209 93211->93225 93293 2fdd47 48 API calls _memcpy_s 93211->93293 93305 3297ed InterlockedDecrement 93211->93305 93313 30c1af 48 API calls 93211->93313 93215 368857 93217 368865 93215->93217 93218 3688aa 93215->93218 93301 339b72 48 API calls 93217->93301 93221 3688a0 Mailbox 93218->93221 93302 33a69d 48 API calls 93218->93302 93219 2ffe30 335 API calls 93219->93225 93221->93219 93223 3688e7 93303 2fbc74 48 API calls 93223->93303 93225->93064 93227 304637 93226->93227 93228 30479f 93226->93228 93229 366e05 93227->93229 93230 304643 93227->93230 93231 2fce19 48 API calls 93228->93231 93376 34e822 93229->93376 93375 304300 335 API calls _memcpy_s 93230->93375 93238 3046e4 Mailbox 93231->93238 93234 366e11 93235 304739 Mailbox 93234->93235 93416 33cc5c 86 API calls 4 library calls 93234->93416 93235->93064 93237 304659 93237->93234 93237->93235 93237->93238 93316 346ff0 93238->93316 93325 2f4252 93238->93325 93331 33fa0c 93238->93331 93372 336524 93238->93372 93244 36df42 93243->93244 93247 30e253 93243->93247 93245 36df77 93244->93245 93246 36df59 TranslateAcceleratorW 93244->93246 93246->93247 93247->93064 93249 30dca3 93248->93249 93252 30dc71 93248->93252 93249->93064 93250 30dc96 IsDialogMessageW 93250->93249 93250->93252 93251 36dd1d GetClassLongW 93251->93250 93251->93252 93252->93249 93252->93250 93252->93251 93253->93064 93254->93019 93255->93013 93256->93018 93257->93064 93258->93064 93260 30f4ea 48 API calls 93259->93260 93261 2fd818 93260->93261 93262 30f4ea 48 API calls 93261->93262 93263 2fd826 93262->93263 93263->93059 93264->93059 93265->93059 93267 2fce28 __wsetenvp 93266->93267 93268 30ee75 48 API calls 93267->93268 93269 2fce50 _memcpy_s 93268->93269 93270 30f4ea 48 API calls 93269->93270 93271 2fce66 93270->93271 93271->93059 93272->93059 93273->93059 93274->93059 93275->93059 93276->93160 93278 301cf6 93277->93278 93281 301ba2 93277->93281 93278->93211 93280 301c5d 93280->93211 93282 30f4ea 48 API calls 93281->93282 93292 301bae 93281->93292 93283 3649c4 93282->93283 93284 30f4ea 48 API calls 93283->93284 93289 3649cf 93284->93289 93285 30f4ea 48 API calls 93287 301c9f 93285->93287 93286 301bb9 93286->93280 93286->93285 93288 301cb2 93287->93288 93314 2f2925 48 API calls 93287->93314 93288->93211 93291 30f4ea 48 API calls 93289->93291 93289->93292 93291->93289 93292->93286 93315 30c15c 48 API calls 93292->93315 93293->93211 93294->93168 93295->93205 93296->93211 93297->93225 93298->93185 93299->93208 93300->93215 93301->93221 93302->93223 93303->93221 93304->93211 93305->93211 93306->93211 93307->93209 93308->93225 93309->93225 93310->93202 93311->93225 93312->93225 93313->93211 93314->93288 93315->93286 93417 2f936c 93316->93417 93318 34702a 93437 2fb470 93318->93437 93320 34703a 93321 34705f 93320->93321 93322 2ffe30 335 API calls 93320->93322 93324 347063 93321->93324 93465 2fcdb9 48 API calls 93321->93465 93322->93321 93324->93235 93326 2f425c 93325->93326 93328 2f4263 93325->93328 93490 3135e4 93326->93490 93329 2f4283 FreeLibrary 93328->93329 93330 2f4272 93328->93330 93329->93330 93330->93235 93332 33fa1c __ftell_nolock 93331->93332 93333 33fa44 93332->93333 93884 2fd286 48 API calls 93332->93884 93335 2f936c 81 API calls 93333->93335 93336 33fa5e 93335->93336 93337 33fb92 93336->93337 93338 33fa80 93336->93338 93339 33fb68 93336->93339 93337->93235 93340 2f936c 81 API calls 93338->93340 93796 2f41a9 93339->93796 93346 33fa8c _wcscpy _wcschr 93340->93346 93343 33fb8e 93343->93337 93345 2f936c 81 API calls 93343->93345 93344 2f41a9 136 API calls 93344->93343 93347 33fbc7 93345->93347 93351 33fab0 _wcscat _wcscpy 93346->93351 93355 33fade _wcscat 93346->93355 93820 311dfc 93347->93820 93349 2f936c 81 API calls 93350 33fafc _wcscpy 93349->93350 93885 3372cb GetFileAttributesW 93350->93885 93353 2f936c 81 API calls 93351->93353 93353->93355 93354 33fb1c __wsetenvp 93354->93337 93357 2f936c 81 API calls 93354->93357 93355->93349 93356 33fbeb _wcscat _wcscpy 93360 2f936c 81 API calls 93356->93360 93358 33fb48 93357->93358 93886 3360dd 77 API calls 4 library calls 93358->93886 93362 33fc82 93360->93362 93361 33fb5c 93361->93337 93823 33690b 93362->93823 93364 33fca2 93365 336524 3 API calls 93364->93365 93366 33fcb1 93365->93366 93367 2f936c 81 API calls 93366->93367 93370 33fce2 93366->93370 93368 33fccb 93367->93368 93829 33bfa4 93368->93829 93371 2f4252 84 API calls 93370->93371 93371->93337 94354 336ca9 GetFileAttributesW 93372->94354 93375->93237 93377 34e84e 93376->93377 93378 34e868 93376->93378 94358 33cc5c 86 API calls 4 library calls 93377->94358 94359 34ccdc 48 API calls 93378->94359 93381 34e871 93382 2ffe30 334 API calls 93381->93382 93383 34e8cf 93382->93383 93384 34e96a 93383->93384 93386 34e916 93383->93386 93415 34e860 Mailbox 93383->93415 93385 34e978 93384->93385 93388 34e9c7 93384->93388 94361 33a69d 48 API calls 93385->94361 94360 339b72 48 API calls 93386->94360 93391 2f936c 81 API calls 93388->93391 93388->93415 93390 34e949 93393 3045e0 334 API calls 93390->93393 93394 34e9e1 93391->93394 93392 34e99b 94362 2fbc74 48 API calls 93392->94362 93393->93415 93396 2fbdfa 48 API calls 93394->93396 93398 34ea05 CharUpperBuffW 93396->93398 93397 34e9a3 Mailbox 93400 303200 334 API calls 93397->93400 93399 34ea1f 93398->93399 93401 34ea26 93399->93401 93402 34ea72 93399->93402 93400->93415 94363 339b72 48 API calls 93401->94363 93403 2f936c 81 API calls 93402->93403 93404 34ea7a 93403->93404 94364 2f1caa 49 API calls 93404->94364 93407 34ea54 93408 3045e0 334 API calls 93407->93408 93408->93415 93409 34ea84 93410 2f936c 81 API calls 93409->93410 93409->93415 93411 34ea9f 93410->93411 94365 2fbc74 48 API calls 93411->94365 93413 34eaaf 93414 303200 334 API calls 93413->93414 93414->93415 93415->93234 93416->93235 93418 2f9384 93417->93418 93419 2f9380 93417->93419 93420 364cbd __i64tow 93418->93420 93421 2f9398 93418->93421 93422 364bbf 93418->93422 93430 2f93b0 __itow Mailbox _wcscpy 93418->93430 93419->93318 93466 31172b 80 API calls 3 library calls 93421->93466 93423 364ca5 93422->93423 93424 364bc8 93422->93424 93467 31172b 80 API calls 3 library calls 93423->93467 93429 364be7 93424->93429 93424->93430 93427 30f4ea 48 API calls 93428 2f93ba 93427->93428 93428->93419 93432 2fce19 48 API calls 93428->93432 93431 30f4ea 48 API calls 93429->93431 93430->93427 93434 364c04 93431->93434 93432->93419 93433 30f4ea 48 API calls 93435 364c2a 93433->93435 93434->93433 93435->93419 93436 2fce19 48 API calls 93435->93436 93436->93419 93468 2f6b0f 93437->93468 93439 2fb69b 93480 2fba85 48 API calls _memcpy_s 93439->93480 93441 2fb6b5 Mailbox 93441->93320 93444 36397b 93487 3326bc 88 API calls 4 library calls 93444->93487 93447 2fb9e4 93489 3326bc 88 API calls 4 library calls 93447->93489 93448 2fba85 48 API calls 93458 2fb495 93448->93458 93449 363973 93449->93441 93452 363989 93488 2fba85 48 API calls _memcpy_s 93452->93488 93453 2fbcce 48 API calls 93453->93458 93455 363909 93483 2f6b4a 93455->93483 93458->93439 93458->93444 93458->93447 93458->93448 93458->93453 93458->93455 93461 2fbdfa 48 API calls 93458->93461 93464 363939 _memcpy_s 93458->93464 93473 2fc413 59 API calls 93458->93473 93474 2fbb85 93458->93474 93479 2fbc74 48 API calls 93458->93479 93481 2fc6a5 49 API calls 93458->93481 93482 2fc799 48 API calls _memcpy_s 93458->93482 93459 363914 93463 30f4ea 48 API calls 93459->93463 93462 2fb66c CharUpperBuffW 93461->93462 93462->93458 93463->93464 93486 3326bc 88 API calls 4 library calls 93464->93486 93465->93324 93466->93430 93467->93430 93469 30f4ea 48 API calls 93468->93469 93470 2f6b34 93469->93470 93471 2f6b4a 48 API calls 93470->93471 93472 2f6b43 93471->93472 93472->93458 93473->93458 93475 2fbb9b 93474->93475 93477 2fbb96 _memcpy_s 93474->93477 93476 30ee75 48 API calls 93475->93476 93478 361b77 93475->93478 93476->93477 93477->93458 93478->93478 93479->93458 93480->93441 93481->93458 93482->93458 93484 30f4ea 48 API calls 93483->93484 93485 2f6b54 93484->93485 93485->93459 93486->93449 93487->93452 93488->93449 93489->93449 93491 3135f0 __wsopen_helper 93490->93491 93492 313604 93491->93492 93493 31361c 93491->93493 93525 317c0e 47 API calls __getptd_noexit 93492->93525 93500 313614 __wsopen_helper 93493->93500 93503 314e1c 93493->93503 93495 313609 93526 316e10 8 API calls __wsopen_helper 93495->93526 93500->93328 93504 314e2c 93503->93504 93505 314e4e EnterCriticalSection 93503->93505 93504->93505 93506 314e34 93504->93506 93507 31362e 93505->93507 93528 317cf4 93506->93528 93509 313578 93507->93509 93510 313587 93509->93510 93511 31359b 93509->93511 93613 317c0e 47 API calls __getptd_noexit 93510->93613 93513 313597 93511->93513 93573 312c84 93511->93573 93527 313653 LeaveCriticalSection LeaveCriticalSection _fseek 93513->93527 93515 31358c 93614 316e10 8 API calls __wsopen_helper 93515->93614 93521 3135b5 93590 31e9d2 93521->93590 93523 3135bb 93523->93513 93524 311c9d _free 47 API calls 93523->93524 93524->93513 93525->93495 93526->93500 93527->93500 93529 317d05 93528->93529 93530 317d18 EnterCriticalSection 93528->93530 93535 317d7c 93529->93535 93530->93507 93532 317d0b 93532->93530 93559 31115b 47 API calls 3 library calls 93532->93559 93536 317d88 __wsopen_helper 93535->93536 93537 317d91 93536->93537 93538 317da9 93536->93538 93560 3181c2 47 API calls 2 library calls 93537->93560 93539 317da7 93538->93539 93545 317e11 __wsopen_helper 93538->93545 93539->93538 93563 3169d0 47 API calls _W_store_winword 93539->93563 93542 317d96 93561 31821f 47 API calls 8 library calls 93542->93561 93543 317dbd 93546 317dd3 93543->93546 93547 317dc4 93543->93547 93545->93532 93550 317cf4 __lock 46 API calls 93546->93550 93564 317c0e 47 API calls __getptd_noexit 93547->93564 93548 317d9d 93562 311145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 93548->93562 93553 317dda 93550->93553 93552 317dc9 93552->93545 93554 317de9 InitializeCriticalSectionAndSpinCount 93553->93554 93555 317dfe 93553->93555 93557 317e04 93554->93557 93565 311c9d 93555->93565 93571 317e1a LeaveCriticalSection _doexit 93557->93571 93560->93542 93561->93548 93563->93543 93564->93552 93566 311ccf _free 93565->93566 93567 311ca6 RtlFreeHeap 93565->93567 93566->93557 93567->93566 93568 311cbb 93567->93568 93572 317c0e 47 API calls __getptd_noexit 93568->93572 93570 311cc1 GetLastError 93570->93566 93571->93545 93572->93570 93574 312cbb 93573->93574 93575 312c97 93573->93575 93579 31eb36 93574->93579 93575->93574 93576 312933 __flush 47 API calls 93575->93576 93577 312cb4 93576->93577 93615 31af61 93577->93615 93580 3135af 93579->93580 93581 31eb43 93579->93581 93583 312933 93580->93583 93581->93580 93582 311c9d _free 47 API calls 93581->93582 93582->93580 93584 312952 93583->93584 93585 31293d 93583->93585 93584->93521 93752 317c0e 47 API calls __getptd_noexit 93585->93752 93587 312942 93753 316e10 8 API calls __wsopen_helper 93587->93753 93589 31294d 93589->93521 93591 31e9de __wsopen_helper 93590->93591 93592 31e9e6 93591->93592 93593 31e9fe 93591->93593 93769 317bda 47 API calls __getptd_noexit 93592->93769 93595 31ea7b 93593->93595 93598 31ea28 93593->93598 93773 317bda 47 API calls __getptd_noexit 93595->93773 93596 31e9eb 93770 317c0e 47 API calls __getptd_noexit 93596->93770 93601 31a8ed ___lock_fhandle 49 API calls 93598->93601 93600 31ea80 93774 317c0e 47 API calls __getptd_noexit 93600->93774 93604 31ea2e 93601->93604 93603 31ea88 93775 316e10 8 API calls __wsopen_helper 93603->93775 93606 31ea41 93604->93606 93607 31ea4c 93604->93607 93754 31ea9c 93606->93754 93771 317c0e 47 API calls __getptd_noexit 93607->93771 93610 31ea47 93772 31ea73 LeaveCriticalSection __unlock_fhandle 93610->93772 93611 31e9f3 __wsopen_helper 93611->93523 93613->93515 93614->93513 93616 31af6d __wsopen_helper 93615->93616 93617 31af75 93616->93617 93618 31af8d 93616->93618 93713 317bda 47 API calls __getptd_noexit 93617->93713 93620 31b022 93618->93620 93625 31afbf 93618->93625 93718 317bda 47 API calls __getptd_noexit 93620->93718 93621 31af7a 93714 317c0e 47 API calls __getptd_noexit 93621->93714 93624 31b027 93719 317c0e 47 API calls __getptd_noexit 93624->93719 93640 31a8ed 93625->93640 93628 31b02f 93720 316e10 8 API calls __wsopen_helper 93628->93720 93629 31afc5 93632 31afd8 93629->93632 93633 31afeb 93629->93633 93630 31af82 __wsopen_helper 93630->93574 93649 31b043 93632->93649 93715 317c0e 47 API calls __getptd_noexit 93633->93715 93636 31afe4 93717 31b01a LeaveCriticalSection __unlock_fhandle 93636->93717 93637 31aff0 93716 317bda 47 API calls __getptd_noexit 93637->93716 93641 31a8f9 __wsopen_helper 93640->93641 93642 31a946 EnterCriticalSection 93641->93642 93643 317cf4 __lock 47 API calls 93641->93643 93644 31a96c __wsopen_helper 93642->93644 93645 31a91d 93643->93645 93644->93629 93646 31a928 InitializeCriticalSectionAndSpinCount 93645->93646 93647 31a93a 93645->93647 93646->93647 93721 31a970 LeaveCriticalSection _doexit 93647->93721 93650 31b050 __ftell_nolock 93649->93650 93651 31b082 93650->93651 93652 31b08d 93650->93652 93653 31b0ac 93650->93653 93745 31a70c 93651->93745 93731 317bda 47 API calls __getptd_noexit 93652->93731 93657 31b105 93653->93657 93658 31b0e9 93653->93658 93656 31b092 93732 317c0e 47 API calls __getptd_noexit 93656->93732 93661 31b11c 93657->93661 93737 31f82f 49 API calls 3 library calls 93657->93737 93734 317bda 47 API calls __getptd_noexit 93658->93734 93659 31b86b 93659->93636 93722 323bf2 93661->93722 93663 31b099 93733 316e10 8 API calls __wsopen_helper 93663->93733 93666 31b0ee 93735 317c0e 47 API calls __getptd_noexit 93666->93735 93668 31b12a 93670 31b44b 93668->93670 93738 317a0d 47 API calls 2 library calls 93668->93738 93672 31b463 93670->93672 93673 31b7b8 WriteFile 93670->93673 93671 31b0f5 93736 316e10 8 API calls __wsopen_helper 93671->93736 93677 31b55a 93672->93677 93684 31b479 93672->93684 93675 31b7e1 GetLastError 93673->93675 93682 31b410 93673->93682 93675->93682 93687 31b663 93677->93687 93690 31b565 93677->93690 93678 31b150 GetConsoleMode 93678->93670 93680 31b189 93678->93680 93679 31b81b 93679->93651 93743 317c0e 47 API calls __getptd_noexit 93679->93743 93680->93670 93683 31b199 GetConsoleCP 93680->93683 93682->93651 93682->93679 93689 31b7f7 93682->93689 93683->93682 93708 31b1c2 93683->93708 93684->93679 93685 31b4e9 WriteFile 93684->93685 93685->93675 93686 31b526 93685->93686 93686->93682 93686->93684 93696 31b555 93686->93696 93687->93679 93691 31b6d8 WideCharToMultiByte 93687->93691 93688 31b843 93744 317bda 47 API calls __getptd_noexit 93688->93744 93693 31b812 93689->93693 93694 31b7fe 93689->93694 93690->93679 93695 31b5de WriteFile 93690->93695 93691->93675 93706 31b71f 93691->93706 93742 317bed 47 API calls 3 library calls 93693->93742 93740 317c0e 47 API calls __getptd_noexit 93694->93740 93695->93675 93699 31b62d 93695->93699 93696->93682 93699->93682 93699->93690 93699->93696 93700 31b727 WriteFile 93703 31b77a GetLastError 93700->93703 93700->93706 93701 31b803 93741 317bda 47 API calls __getptd_noexit 93701->93741 93703->93706 93705 3240f7 59 API calls __chsize_nolock 93705->93708 93706->93682 93706->93687 93706->93696 93706->93700 93707 325884 WriteConsoleW CreateFileW __chsize_nolock 93711 31b2f6 93707->93711 93708->93682 93708->93705 93709 31b28f WideCharToMultiByte 93708->93709 93708->93711 93739 311688 57 API calls __isleadbyte_l 93708->93739 93709->93682 93710 31b2ca WriteFile 93709->93710 93710->93675 93710->93711 93711->93675 93711->93682 93711->93707 93711->93708 93712 31b321 WriteFile 93711->93712 93712->93675 93712->93711 93713->93621 93714->93630 93715->93637 93716->93636 93717->93630 93718->93624 93719->93628 93720->93630 93721->93642 93723 323c0a 93722->93723 93724 323bfd 93722->93724 93726 323c16 93723->93726 93727 317c0e __wsopen_helper 47 API calls 93723->93727 93725 317c0e __wsopen_helper 47 API calls 93724->93725 93728 323c02 93725->93728 93726->93668 93729 323c37 93727->93729 93728->93668 93730 316e10 __wsopen_helper 8 API calls 93729->93730 93730->93728 93731->93656 93732->93663 93733->93651 93734->93666 93735->93671 93736->93651 93737->93661 93738->93678 93739->93708 93740->93701 93741->93651 93742->93651 93743->93688 93744->93651 93746 31a714 93745->93746 93747 31a716 IsProcessorFeaturePresent 93745->93747 93746->93659 93749 3237b0 93747->93749 93750 32375f ___raise_securityfailure 5 API calls 93749->93750 93751 323893 93750->93751 93751->93659 93752->93587 93753->93589 93776 31aba4 93754->93776 93756 31eb00 93789 31ab1e 48 API calls 2 library calls 93756->93789 93758 31eaaa 93758->93756 93760 31aba4 __chsize_nolock 47 API calls 93758->93760 93768 31eade 93758->93768 93759 31eb08 93765 31eb2a 93759->93765 93790 317bed 47 API calls 3 library calls 93759->93790 93762 31ead5 93760->93762 93761 31aba4 __chsize_nolock 47 API calls 93763 31eaea CloseHandle 93761->93763 93766 31aba4 __chsize_nolock 47 API calls 93762->93766 93763->93756 93767 31eaf6 GetLastError 93763->93767 93765->93610 93766->93768 93767->93756 93768->93756 93768->93761 93769->93596 93770->93611 93771->93610 93772->93611 93773->93600 93774->93603 93775->93611 93777 31abc4 93776->93777 93778 31abaf 93776->93778 93782 31abe9 93777->93782 93793 317bda 47 API calls __getptd_noexit 93777->93793 93791 317bda 47 API calls __getptd_noexit 93778->93791 93781 31abb4 93792 317c0e 47 API calls __getptd_noexit 93781->93792 93782->93758 93783 31abf3 93794 317c0e 47 API calls __getptd_noexit 93783->93794 93786 31abbc 93786->93758 93787 31abfb 93795 316e10 8 API calls __wsopen_helper 93787->93795 93789->93759 93790->93765 93791->93781 93792->93786 93793->93783 93794->93787 93795->93786 93887 2f4214 93796->93887 93801 364f73 93803 2f4252 84 API calls 93801->93803 93802 2f41d4 LoadLibraryExW 93897 2f4291 93802->93897 93805 364f7a 93803->93805 93807 2f4291 3 API calls 93805->93807 93810 364f82 93807->93810 93809 2f41fb 93809->93810 93811 2f4207 93809->93811 93923 2f44ed 93810->93923 93812 2f4252 84 API calls 93811->93812 93814 2f420c 93812->93814 93814->93343 93814->93344 93817 364fa9 93931 2f4950 93817->93931 94214 311e46 93820->94214 93824 336918 _wcschr __ftell_nolock 93823->93824 93825 311dfc __wsplitpath 47 API calls 93824->93825 93828 33692e _wcscat _wcscpy 93824->93828 93826 33695d 93825->93826 93827 311dfc __wsplitpath 47 API calls 93826->93827 93827->93828 93828->93364 93830 33bfb1 __ftell_nolock 93829->93830 93831 30f4ea 48 API calls 93830->93831 93832 33c00e 93831->93832 93833 2f47b7 48 API calls 93832->93833 93834 33c018 93833->93834 93835 33bdb4 GetSystemTimeAsFileTime 93834->93835 93836 33c023 93835->93836 93837 2f4517 83 API calls 93836->93837 93838 33c036 _wcscmp 93837->93838 93839 33c107 93838->93839 93840 33c05a 93838->93840 93841 33c56d 94 API calls 93839->93841 94257 33c56d 93840->94257 93857 33c0d3 _wcscat 93841->93857 93844 311dfc __wsplitpath 47 API calls 93849 33c088 _wcscat _wcscpy 93844->93849 93845 2f44ed 64 API calls 93846 33c12c 93845->93846 93848 2f44ed 64 API calls 93846->93848 93847 33c110 93847->93370 93850 33c13c 93848->93850 93852 311dfc __wsplitpath 47 API calls 93849->93852 93851 2f44ed 64 API calls 93850->93851 93853 33c157 93851->93853 93852->93857 93854 2f44ed 64 API calls 93853->93854 93855 33c167 93854->93855 93856 2f44ed 64 API calls 93855->93856 93858 33c182 93856->93858 93857->93845 93857->93847 93859 2f44ed 64 API calls 93858->93859 93860 33c192 93859->93860 93861 2f44ed 64 API calls 93860->93861 93862 33c1a2 93861->93862 93863 2f44ed 64 API calls 93862->93863 93864 33c1b2 93863->93864 94240 33c71a GetTempPathW GetTempFileNameW 93864->94240 93866 33c1be 93867 313499 117 API calls 93866->93867 93877 33c1cf 93867->93877 93868 33c289 93869 3135e4 __fcloseall 83 API calls 93868->93869 93870 33c294 93869->93870 93872 33c29a DeleteFileW 93870->93872 93873 33c2ae 93870->93873 93871 2f44ed 64 API calls 93871->93877 93872->93847 93874 33c342 CopyFileW 93873->93874 93879 33c2b8 93873->93879 93875 33c36a DeleteFileW 93874->93875 93876 33c358 DeleteFileW 93874->93876 94254 33c6d9 CreateFileW 93875->94254 93876->93847 93877->93847 93877->93868 93877->93871 94241 312aae 93877->94241 94263 33b965 93879->94263 93884->93333 93885->93354 93886->93361 93936 2f4339 93887->93936 93891 2f41bb 93894 313499 93891->93894 93892 2f4244 FreeLibrary 93892->93891 93893 2f423c 93893->93891 93893->93892 93944 3134ae 93894->93944 93896 2f41c8 93896->93801 93896->93802 94023 2f42e4 93897->94023 93900 2f42b8 93902 2f41ec 93900->93902 93903 2f42c1 FreeLibrary 93900->93903 93904 2f4380 93902->93904 93903->93902 93905 30f4ea 48 API calls 93904->93905 93906 2f4395 93905->93906 94031 2f47b7 93906->94031 93908 2f43a1 _memcpy_s 93909 2f43dc 93908->93909 93910 2f4499 93908->93910 93911 2f44d1 93908->93911 93912 2f4950 57 API calls 93909->93912 94034 2f406b CreateStreamOnHGlobal 93910->94034 94045 33c750 93 API calls 93911->94045 93920 2f43e5 93912->93920 93915 2f44ed 64 API calls 93915->93920 93916 2f4479 93916->93809 93918 364ed7 93919 2f4517 83 API calls 93918->93919 93921 364eeb 93919->93921 93920->93915 93920->93916 93920->93918 94040 2f4517 93920->94040 93922 2f44ed 64 API calls 93921->93922 93922->93916 93924 2f44ff 93923->93924 93925 364fc0 93923->93925 94063 31381e 93924->94063 93928 33bf5a 94191 33bdb4 93928->94191 93930 33bf70 93930->93817 93932 2f495f 93931->93932 93933 365002 93931->93933 94196 313e65 93932->94196 93935 2f4967 93940 2f434b 93936->93940 93939 2f4321 LoadLibraryA GetProcAddress 93939->93893 93941 2f422f 93940->93941 93942 2f4354 LoadLibraryA 93940->93942 93941->93893 93941->93939 93942->93941 93943 2f4365 GetProcAddress 93942->93943 93943->93941 93947 3134ba __wsopen_helper 93944->93947 93945 3134cd 93992 317c0e 47 API calls __getptd_noexit 93945->93992 93947->93945 93949 3134fe 93947->93949 93948 3134d2 93993 316e10 8 API calls __wsopen_helper 93948->93993 93963 31e4c8 93949->93963 93952 313503 93953 313519 93952->93953 93954 31350c 93952->93954 93956 313543 93953->93956 93957 313523 93953->93957 93994 317c0e 47 API calls __getptd_noexit 93954->93994 93977 31e5e0 93956->93977 93995 317c0e 47 API calls __getptd_noexit 93957->93995 93960 3134dd __wsopen_helper @_EH4_CallFilterFunc@8 93960->93896 93964 31e4d4 __wsopen_helper 93963->93964 93965 317cf4 __lock 47 API calls 93964->93965 93966 31e4e2 93965->93966 93967 31e559 93966->93967 93972 317d7c __mtinitlocknum 47 API calls 93966->93972 93975 31e552 93966->93975 94000 314e5b 48 API calls __lock 93966->94000 94001 314ec5 LeaveCriticalSection LeaveCriticalSection _doexit 93966->94001 94002 3169d0 47 API calls _W_store_winword 93967->94002 93970 31e560 93971 31e56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 93970->93971 93970->93975 93971->93975 93972->93966 93974 31e5cc __wsopen_helper 93974->93952 93997 31e5d7 93975->93997 93978 31e600 __wopenfile 93977->93978 93979 31e61a 93978->93979 93991 31e7d5 93978->93991 94009 31185b 59 API calls 2 library calls 93978->94009 94007 317c0e 47 API calls __getptd_noexit 93979->94007 93981 31e61f 94008 316e10 8 API calls __wsopen_helper 93981->94008 93983 31e838 94004 3263c9 93983->94004 93985 31354e 93996 313570 LeaveCriticalSection LeaveCriticalSection _fseek 93985->93996 93987 31e7ce 93987->93991 94010 31185b 59 API calls 2 library calls 93987->94010 93989 31e7ed 93989->93991 94011 31185b 59 API calls 2 library calls 93989->94011 93991->93979 93991->93983 93992->93948 93993->93960 93994->93960 93995->93960 93996->93960 94003 317e58 LeaveCriticalSection 93997->94003 93999 31e5de 93999->93974 94000->93966 94001->93966 94002->93970 94003->93999 94012 325bb1 94004->94012 94006 3263e2 94006->93985 94007->93981 94008->93985 94009->93987 94010->93989 94011->93991 94013 325bbd __wsopen_helper 94012->94013 94014 325bcf 94013->94014 94017 325c06 94013->94017 94015 317c0e __wsopen_helper 47 API calls 94014->94015 94016 325bd4 94015->94016 94018 316e10 __wsopen_helper 8 API calls 94016->94018 94019 325c78 __wsopen_helper 110 API calls 94017->94019 94022 325bde __wsopen_helper 94018->94022 94020 325c23 94019->94020 94021 325c4c __wsopen_helper LeaveCriticalSection 94020->94021 94021->94022 94022->94006 94027 2f42f6 94023->94027 94026 2f42cc LoadLibraryA GetProcAddress 94026->93900 94028 2f42aa 94027->94028 94029 2f42ff LoadLibraryA 94027->94029 94028->93900 94028->94026 94029->94028 94030 2f4310 GetProcAddress 94029->94030 94030->94028 94032 30f4ea 48 API calls 94031->94032 94033 2f47c9 94032->94033 94033->93908 94035 2f4085 FindResourceExW 94034->94035 94039 2f40a2 94034->94039 94036 364f16 LoadResource 94035->94036 94035->94039 94037 364f2b SizeofResource 94036->94037 94036->94039 94038 364f3f LockResource 94037->94038 94037->94039 94038->94039 94039->93909 94041 364fe0 94040->94041 94042 2f4526 94040->94042 94046 313a8d 94042->94046 94044 2f4534 94044->93920 94045->93909 94047 313a99 __wsopen_helper 94046->94047 94048 313aa7 94047->94048 94049 313acd 94047->94049 94059 317c0e 47 API calls __getptd_noexit 94048->94059 94051 314e1c __lock_file 48 API calls 94049->94051 94053 313ad3 94051->94053 94052 313aac 94060 316e10 8 API calls __wsopen_helper 94052->94060 94061 3139fe 81 API calls 4 library calls 94053->94061 94056 313ae2 94062 313b04 LeaveCriticalSection LeaveCriticalSection _fseek 94056->94062 94058 313ab7 __wsopen_helper 94058->94044 94059->94052 94060->94058 94061->94056 94062->94058 94066 313839 94063->94066 94065 2f4510 94065->93928 94067 313845 __wsopen_helper 94066->94067 94068 313888 94067->94068 94069 31385b _memset 94067->94069 94070 313880 __wsopen_helper 94067->94070 94071 314e1c __lock_file 48 API calls 94068->94071 94093 317c0e 47 API calls __getptd_noexit 94069->94093 94070->94065 94073 31388e 94071->94073 94079 31365b 94073->94079 94074 313875 94094 316e10 8 API calls __wsopen_helper 94074->94094 94082 313676 _memset 94079->94082 94086 313691 94079->94086 94080 313681 94187 317c0e 47 API calls __getptd_noexit 94080->94187 94082->94080 94083 3136cf 94082->94083 94082->94086 94083->94086 94087 3137e0 _memset 94083->94087 94088 312933 __flush 47 API calls 94083->94088 94096 31ee0e 94083->94096 94167 31eb66 94083->94167 94189 31ec87 47 API calls 3 library calls 94083->94189 94095 3138c2 LeaveCriticalSection LeaveCriticalSection _fseek 94086->94095 94190 317c0e 47 API calls __getptd_noexit 94087->94190 94088->94083 94092 313686 94188 316e10 8 API calls __wsopen_helper 94092->94188 94093->94074 94094->94070 94095->94070 94097 31ee46 94096->94097 94098 31ee2f 94096->94098 94100 31f57e 94097->94100 94104 31ee80 94097->94104 94099 317bda __chsize_nolock 47 API calls 94098->94099 94101 31ee34 94099->94101 94102 317bda __chsize_nolock 47 API calls 94100->94102 94103 317c0e __wsopen_helper 47 API calls 94101->94103 94105 31f583 94102->94105 94148 31ee3b 94103->94148 94106 31ee88 94104->94106 94109 31ee9f 94104->94109 94107 317c0e __wsopen_helper 47 API calls 94105->94107 94108 317bda __chsize_nolock 47 API calls 94106->94108 94111 31ee94 94107->94111 94110 31ee8d 94108->94110 94113 31eeb4 94109->94113 94115 31eece 94109->94115 94117 31eeec 94109->94117 94109->94148 94116 317c0e __wsopen_helper 47 API calls 94110->94116 94112 316e10 __wsopen_helper 8 API calls 94111->94112 94112->94148 94114 317bda __chsize_nolock 47 API calls 94113->94114 94114->94110 94115->94113 94121 31eed9 94115->94121 94116->94111 94119 3169d0 __malloc_crt 47 API calls 94117->94119 94122 31eefc 94119->94122 94120 323bf2 __stbuf 47 API calls 94123 31efed 94120->94123 94121->94120 94124 31ef04 94122->94124 94125 31ef1f 94122->94125 94127 31f066 ReadFile 94123->94127 94132 31f003 GetConsoleMode 94123->94132 94126 317c0e __wsopen_helper 47 API calls 94124->94126 94128 31f82f __lseeki64_nolock 49 API calls 94125->94128 94129 31ef09 94126->94129 94130 31f546 GetLastError 94127->94130 94131 31f088 94127->94131 94133 31ef2d 94128->94133 94134 317bda __chsize_nolock 47 API calls 94129->94134 94135 31f553 94130->94135 94136 31f046 94130->94136 94131->94130 94141 31f058 94131->94141 94137 31f063 94132->94137 94138 31f017 94132->94138 94133->94121 94139 31ef14 94134->94139 94140 317c0e __wsopen_helper 47 API calls 94135->94140 94145 317bed __dosmaperr 47 API calls 94136->94145 94149 31f04c 94136->94149 94137->94127 94138->94137 94142 31f01d ReadConsoleW 94138->94142 94139->94148 94143 31f558 94140->94143 94141->94149 94150 31f0bd 94141->94150 94157 31f32a 94141->94157 94142->94141 94144 31f040 GetLastError 94142->94144 94146 317bda __chsize_nolock 47 API calls 94143->94146 94144->94136 94145->94149 94146->94149 94147 311c9d _free 47 API calls 94147->94148 94148->94083 94149->94147 94149->94148 94152 31f129 ReadFile 94150->94152 94158 31f1aa 94150->94158 94153 31f14a GetLastError 94152->94153 94166 31f154 94152->94166 94153->94166 94154 31f267 94161 31f217 MultiByteToWideChar 94154->94161 94162 31f82f __lseeki64_nolock 49 API calls 94154->94162 94155 31f257 94159 317c0e __wsopen_helper 47 API calls 94155->94159 94156 31f430 ReadFile 94160 31f453 GetLastError 94156->94160 94165 31f461 94156->94165 94157->94149 94157->94156 94158->94149 94158->94154 94158->94155 94158->94161 94159->94149 94160->94165 94161->94144 94161->94149 94162->94161 94163 31f82f __lseeki64_nolock 49 API calls 94163->94166 94164 31f82f __lseeki64_nolock 49 API calls 94164->94165 94165->94157 94165->94164 94166->94150 94166->94163 94168 31eb71 94167->94168 94171 31eb86 94167->94171 94169 317c0e __wsopen_helper 47 API calls 94168->94169 94170 31eb76 94169->94170 94172 316e10 __wsopen_helper 8 API calls 94170->94172 94173 31ebbb 94171->94173 94174 323e24 __getbuf 47 API calls 94171->94174 94179 31eb81 94171->94179 94172->94179 94175 312933 __flush 47 API calls 94173->94175 94174->94173 94176 31ebcf 94175->94176 94177 31ed06 __filbuf 62 API calls 94176->94177 94178 31ebd6 94177->94178 94178->94179 94180 312933 __flush 47 API calls 94178->94180 94179->94083 94181 31ebf9 94180->94181 94181->94179 94182 312933 __flush 47 API calls 94181->94182 94183 31ec05 94182->94183 94183->94179 94184 312933 __flush 47 API calls 94183->94184 94185 31ec12 94184->94185 94186 312933 __flush 47 API calls 94185->94186 94186->94179 94187->94092 94188->94086 94189->94083 94190->94092 94194 31344a GetSystemTimeAsFileTime 94191->94194 94193 33bdc3 94193->93930 94195 313478 __aulldiv 94194->94195 94195->94193 94197 313e71 __wsopen_helper 94196->94197 94198 313e94 94197->94198 94199 313e7f 94197->94199 94200 314e1c __lock_file 48 API calls 94198->94200 94210 317c0e 47 API calls __getptd_noexit 94199->94210 94202 313e9a 94200->94202 94212 313b0c 55 API calls 6 library calls 94202->94212 94203 313e84 94211 316e10 8 API calls __wsopen_helper 94203->94211 94206 313ea5 94213 313ec5 LeaveCriticalSection LeaveCriticalSection _fseek 94206->94213 94208 313eb7 94209 313e8f __wsopen_helper 94208->94209 94209->93935 94210->94203 94211->94209 94212->94206 94213->94208 94215 311e61 94214->94215 94218 311e55 94214->94218 94238 317c0e 47 API calls __getptd_noexit 94215->94238 94217 312019 94227 311e41 94217->94227 94239 316e10 8 API calls __wsopen_helper 94217->94239 94218->94215 94225 311ed4 94218->94225 94233 319d6b 47 API calls __wsopen_helper 94218->94233 94221 311fa0 94221->94215 94223 311fb0 94221->94223 94221->94227 94222 311f5f 94222->94215 94224 311f7b 94222->94224 94235 319d6b 47 API calls __wsopen_helper 94222->94235 94237 319d6b 47 API calls __wsopen_helper 94223->94237 94224->94215 94224->94227 94229 311f91 94224->94229 94225->94215 94232 311f41 94225->94232 94234 319d6b 47 API calls __wsopen_helper 94225->94234 94227->93356 94236 319d6b 47 API calls __wsopen_helper 94229->94236 94232->94221 94232->94222 94233->94225 94234->94232 94235->94224 94236->94227 94237->94227 94238->94217 94239->94227 94240->93866 94242 312aba __wsopen_helper 94241->94242 94243 312ad4 94242->94243 94244 312aec 94242->94244 94245 312ae4 __wsopen_helper 94242->94245 94306 317c0e 47 API calls __getptd_noexit 94243->94306 94247 314e1c __lock_file 48 API calls 94244->94247 94245->93877 94249 312af2 94247->94249 94248 312ad9 94307 316e10 8 API calls __wsopen_helper 94248->94307 94294 312957 94249->94294 94262 33c581 __tzset_nolock _wcscmp 94257->94262 94258 2f44ed 64 API calls 94258->94262 94259 33c05f 94259->93844 94259->93847 94260 33bf5a GetSystemTimeAsFileTime 94260->94262 94261 2f4517 83 API calls 94261->94262 94262->94258 94262->94259 94262->94260 94262->94261 94306->94248 94307->94245 94355 336529 94354->94355 94356 336cc4 FindFirstFileW 94354->94356 94355->93235 94356->94355 94357 336cd9 FindClose 94356->94357 94357->94355 94358->93415 94359->93381 94360->93390 94361->93392 94362->93397 94363->93407 94364->93409 94365->93413 94366->93097 94367->93097 94368->93099 94369->93099 94370->93091 94371->93087 94372->93098 94373->93111 94374->93111 94375->93112 94376->93128 94377->93134 94378 fc7438 94392 fc5088 94378->94392 94380 fc74ca 94395 fc7328 94380->94395 94398 fc84f8 GetPEB 94392->94398 94394 fc5713 94394->94380 94396 fc7331 Sleep 94395->94396 94397 fc733f 94396->94397 94399 fc8522 94398->94399 94399->94394 94400 369bec 94436 300ae0 _memcpy_s Mailbox 94400->94436 94402 30f4ea 48 API calls 94402->94436 94406 300509 94495 33cc5c 86 API calls 4 library calls 94406->94495 94407 30f4ea 48 API calls 94429 2ffec8 94407->94429 94409 30146e 94414 2f6eed 48 API calls 94409->94414 94410 301473 94494 33cc5c 86 API calls 4 library calls 94410->94494 94412 36a246 94417 2f6eed 48 API calls 94412->94417 94427 2fffe1 Mailbox 94414->94427 94415 36a922 94417->94427 94419 2f6eed 48 API calls 94419->94429 94420 36a873 94421 36a30e 94421->94427 94490 3297ed InterlockedDecrement 94421->94490 94422 2fd7f7 48 API calls 94422->94429 94423 310f0a 52 API calls __cinit 94423->94429 94424 2fce19 48 API calls 94424->94436 94425 3297ed InterlockedDecrement 94425->94429 94428 36a973 94496 33cc5c 86 API calls 4 library calls 94428->94496 94429->94406 94429->94407 94429->94409 94429->94410 94429->94412 94429->94419 94429->94421 94429->94422 94429->94423 94429->94425 94429->94427 94429->94428 94432 3015b5 94429->94432 94487 301820 335 API calls 2 library calls 94429->94487 94488 301d10 59 API calls Mailbox 94429->94488 94431 36a982 94493 33cc5c 86 API calls 4 library calls 94432->94493 94433 34e822 335 API calls 94433->94436 94434 2ffe30 335 API calls 94434->94436 94435 36a706 94491 33cc5c 86 API calls 4 library calls 94435->94491 94436->94402 94436->94424 94436->94427 94436->94429 94436->94433 94436->94434 94436->94435 94438 301526 Mailbox 94436->94438 94439 3297ed InterlockedDecrement 94436->94439 94440 346ff0 335 API calls 94436->94440 94443 350d1d 94436->94443 94446 350d09 94436->94446 94449 34f0ac 94436->94449 94481 33a6ef 94436->94481 94489 34ef61 82 API calls 2 library calls 94436->94489 94492 33cc5c 86 API calls 4 library calls 94438->94492 94439->94436 94440->94436 94497 34f8ae 94443->94497 94445 350d2d 94445->94436 94447 34f8ae 129 API calls 94446->94447 94448 350d19 94447->94448 94448->94436 94450 2fd7f7 48 API calls 94449->94450 94451 34f0c0 94450->94451 94452 2fd7f7 48 API calls 94451->94452 94453 34f0c8 94452->94453 94454 2fd7f7 48 API calls 94453->94454 94455 34f0d0 94454->94455 94456 2f936c 81 API calls 94455->94456 94480 34f0de 94456->94480 94457 2f6a63 48 API calls 94457->94480 94458 34f2cc 94459 34f2f9 Mailbox 94458->94459 94635 2f6b68 48 API calls 94458->94635 94459->94436 94461 34f2b3 94616 2f518c 94461->94616 94462 34f2ce 94465 2f518c 48 API calls 94462->94465 94463 2f6eed 48 API calls 94463->94480 94468 34f2dd 94465->94468 94467 2fc799 48 API calls 94467->94480 94471 2f510d 48 API calls 94468->94471 94469 2fbdfa 48 API calls 94473 34f175 CharUpperBuffW 94469->94473 94471->94458 94472 2fbdfa 48 API calls 94474 34f23a CharUpperBuffW 94472->94474 94475 2fd645 53 API calls 94473->94475 94615 30d922 55 API calls 2 library calls 94474->94615 94475->94480 94477 2f518c 48 API calls 94477->94480 94478 2f936c 81 API calls 94478->94480 94479 2f510d 48 API calls 94479->94480 94480->94457 94480->94458 94480->94459 94480->94461 94480->94462 94480->94463 94480->94467 94480->94469 94480->94472 94480->94477 94480->94478 94480->94479 94482 33a6fb 94481->94482 94483 30f4ea 48 API calls 94482->94483 94484 33a709 94483->94484 94485 33a717 94484->94485 94486 2fd7f7 48 API calls 94484->94486 94485->94436 94486->94485 94487->94429 94488->94429 94489->94436 94490->94427 94491->94438 94492->94427 94493->94427 94494->94420 94495->94415 94496->94431 94498 2f936c 81 API calls 94497->94498 94499 34f8ea 94498->94499 94521 34f92c Mailbox 94499->94521 94533 350567 94499->94533 94501 34fb8b 94502 34fcfa 94501->94502 94506 34fb95 94501->94506 94592 350688 89 API calls Mailbox 94502->94592 94505 34fd07 94505->94506 94507 34fd13 94505->94507 94546 34f70a 94506->94546 94507->94521 94508 2f936c 81 API calls 94526 34f984 Mailbox 94508->94526 94513 34fbc9 94560 30ed18 94513->94560 94516 34fbe3 94590 33cc5c 86 API calls 4 library calls 94516->94590 94517 34fbfd 94564 30c050 94517->94564 94520 34fbee GetCurrentProcess TerminateProcess 94520->94517 94521->94445 94522 34fc14 94523 301b90 48 API calls 94522->94523 94532 34fc3e 94522->94532 94525 34fc2d 94523->94525 94524 34fd65 94524->94521 94529 34fd7e FreeLibrary 94524->94529 94527 35040f 105 API calls 94525->94527 94526->94501 94526->94508 94526->94521 94526->94526 94588 3529e8 48 API calls _memcpy_s 94526->94588 94589 34fda5 60 API calls 2 library calls 94526->94589 94527->94532 94528 301b90 48 API calls 94528->94532 94529->94521 94532->94524 94532->94528 94575 35040f 94532->94575 94591 2fdcae 50 API calls Mailbox 94532->94591 94534 2fbdfa 48 API calls 94533->94534 94535 350582 CharLowerBuffW 94534->94535 94593 331f11 94535->94593 94539 2fd7f7 48 API calls 94540 3505bb 94539->94540 94600 2f69e9 48 API calls _memcpy_s 94540->94600 94542 3505d2 94601 2fb18b 94542->94601 94544 3505de Mailbox 94545 35061a Mailbox 94544->94545 94605 34fda5 60 API calls 2 library calls 94544->94605 94545->94526 94547 34f725 94546->94547 94551 34f77a 94546->94551 94548 30f4ea 48 API calls 94547->94548 94550 34f747 94548->94550 94549 30f4ea 48 API calls 94549->94550 94550->94549 94550->94551 94552 350828 94551->94552 94553 350a53 Mailbox 94552->94553 94559 35084b _strcat _wcscpy __wsetenvp 94552->94559 94553->94513 94554 2fcf93 58 API calls 94554->94559 94555 2fd286 48 API calls 94555->94559 94556 31395c 47 API calls _W_store_winword 94556->94559 94557 2f936c 81 API calls 94557->94559 94559->94553 94559->94554 94559->94555 94559->94556 94559->94557 94608 338035 50 API calls __wsetenvp 94559->94608 94562 30ed2d 94560->94562 94561 30edc5 VirtualProtect 94563 30ed93 94561->94563 94562->94561 94562->94563 94563->94516 94563->94517 94565 30c064 94564->94565 94567 30c069 Mailbox 94564->94567 94609 30c1af 48 API calls 94565->94609 94573 30c077 94567->94573 94610 30c15c 48 API calls 94567->94610 94569 30f4ea 48 API calls 94571 30c108 94569->94571 94570 30c152 94570->94522 94572 30f4ea 48 API calls 94571->94572 94574 30c113 94572->94574 94573->94569 94573->94570 94574->94522 94574->94574 94576 350427 94575->94576 94580 350443 94575->94580 94577 35044f 94576->94577 94578 35042e 94576->94578 94579 3504f8 94576->94579 94576->94580 94613 2fcdb9 48 API calls 94577->94613 94611 337c56 50 API calls _strlen 94578->94611 94614 339dc5 103 API calls 94579->94614 94583 311c9d _free 47 API calls 94580->94583 94585 35051e 94580->94585 94583->94585 94585->94532 94586 350438 94612 2fcdb9 48 API calls 94586->94612 94588->94526 94589->94526 94590->94520 94591->94532 94592->94505 94594 331f3b __wsetenvp 94593->94594 94595 331f79 94594->94595 94596 331f6f 94594->94596 94597 331ffa 94594->94597 94595->94539 94595->94544 94596->94595 94606 30d37a 60 API calls 94596->94606 94597->94595 94607 30d37a 60 API calls 94597->94607 94600->94542 94602 2fb1a2 _memcpy_s 94601->94602 94603 2fb199 94601->94603 94602->94544 94603->94602 94604 2fbdfa 48 API calls 94603->94604 94604->94602 94605->94545 94606->94596 94607->94597 94608->94559 94609->94567 94610->94573 94611->94586 94612->94580 94613->94580 94614->94580 94615->94480 94617 2f5197 94616->94617 94618 2f519f 94617->94618 94619 361ace 94617->94619 94636 2f5130 94618->94636 94621 2f6b4a 48 API calls 94619->94621 94623 361adb __wsetenvp 94621->94623 94622 2f51aa 94626 2f510d 94622->94626 94624 30ee75 48 API calls 94623->94624 94625 361b07 _memcpy_s 94624->94625 94627 2f511f 94626->94627 94628 361be7 94626->94628 94646 2fb384 94627->94646 94655 32a58f 48 API calls _memcpy_s 94628->94655 94631 361bf1 94633 2f6eed 48 API calls 94631->94633 94632 2f512b 94632->94458 94634 361bf9 Mailbox 94633->94634 94635->94459 94637 2f513f __wsetenvp 94636->94637 94638 361b27 94637->94638 94639 2f5151 94637->94639 94640 2f6b4a 48 API calls 94638->94640 94641 2fbb85 48 API calls 94639->94641 94643 361b34 94640->94643 94642 2f515e _memcpy_s 94641->94642 94642->94622 94644 30ee75 48 API calls 94643->94644 94645 361b57 _memcpy_s 94644->94645 94647 2fb392 94646->94647 94648 2fb3c5 _memcpy_s 94646->94648 94647->94648 94649 2fb3fd 94647->94649 94650 2fb3b8 94647->94650 94648->94632 94648->94648 94652 30f4ea 48 API calls 94649->94652 94651 2fbb85 48 API calls 94650->94651 94651->94648 94653 2fb407 94652->94653 94654 30f4ea 48 API calls 94653->94654 94654->94648 94655->94631 94656 3619dd 94661 2f4a30 94656->94661 94658 3619f1 94681 310f0a 52 API calls __cinit 94658->94681 94660 3619fb 94662 2f4a40 __ftell_nolock 94661->94662 94663 2fd7f7 48 API calls 94662->94663 94664 2f4af6 94663->94664 94682 2f5374 94664->94682 94666 2f4aff 94689 2f363c 94666->94689 94669 2f518c 48 API calls 94670 2f4b18 94669->94670 94695 2f64cf 94670->94695 94673 2fd7f7 48 API calls 94674 2f4b32 94673->94674 94701 2f49fb 94674->94701 94676 2f4b43 Mailbox 94676->94658 94677 2f61a6 48 API calls 94680 2f4b3d _wcscat Mailbox __wsetenvp 94677->94680 94678 2fce19 48 API calls 94678->94680 94679 2f64cf 48 API calls 94679->94680 94680->94676 94680->94677 94680->94678 94680->94679 94681->94660 94715 31f8a0 94682->94715 94685 2fce19 48 API calls 94686 2f53a7 94685->94686 94717 2f660f 94686->94717 94688 2f53b1 Mailbox 94688->94666 94690 2f3649 __ftell_nolock 94689->94690 94740 2f366c GetFullPathNameW 94690->94740 94692 2f365a 94693 2f6a63 48 API calls 94692->94693 94694 2f3669 94693->94694 94694->94669 94696 2f651b 94695->94696 94700 2f64dd _memcpy_s 94695->94700 94699 30f4ea 48 API calls 94696->94699 94697 30f4ea 48 API calls 94698 2f4b29 94697->94698 94698->94673 94699->94700 94700->94697 94742 2fbcce 94701->94742 94704 2f4a2b 94704->94680 94705 3641cc RegQueryValueExW 94706 364246 RegCloseKey 94705->94706 94707 3641e5 94705->94707 94708 30f4ea 48 API calls 94707->94708 94709 3641fe 94708->94709 94710 2f47b7 48 API calls 94709->94710 94711 364208 RegQueryValueExW 94710->94711 94712 364224 94711->94712 94714 36423b 94711->94714 94713 2f6a63 48 API calls 94712->94713 94713->94714 94714->94706 94716 2f5381 GetModuleFileNameW 94715->94716 94716->94685 94718 31f8a0 __ftell_nolock 94717->94718 94719 2f661c GetFullPathNameW 94718->94719 94724 2f6a63 94719->94724 94721 2f6643 94735 2f6571 94721->94735 94725 2f6adf 94724->94725 94728 2f6a6f __wsetenvp 94724->94728 94726 2fb18b 48 API calls 94725->94726 94727 2f6ab6 _memcpy_s 94726->94727 94727->94721 94729 2f6a8b 94728->94729 94730 2f6ad7 94728->94730 94732 2f6b4a 48 API calls 94729->94732 94739 2fc369 48 API calls 94730->94739 94733 2f6a95 94732->94733 94734 30ee75 48 API calls 94733->94734 94734->94727 94736 2f657f 94735->94736 94737 2fb18b 48 API calls 94736->94737 94738 2f658f 94737->94738 94738->94688 94739->94727 94741 2f368a 94740->94741 94741->94692 94743 2f4a0a RegOpenKeyExW 94742->94743 94744 2fbce8 94742->94744 94743->94704 94743->94705 94745 30f4ea 48 API calls 94744->94745 94746 2fbcf2 94745->94746 94747 30ee75 48 API calls 94746->94747 94747->94743 94748 3619ba 94753 30c75a 94748->94753 94752 3619c9 94754 2fd7f7 48 API calls 94753->94754 94755 30c7c8 94754->94755 94761 30d26c 94755->94761 94757 30c865 94759 30c881 94757->94759 94764 30d1fa 48 API calls _memcpy_s 94757->94764 94760 310f0a 52 API calls __cinit 94759->94760 94760->94752 94765 30d298 94761->94765 94764->94757 94766 30d2a5 94765->94766 94768 30d28b 94765->94768 94767 30d2ac RegOpenKeyExW 94766->94767 94766->94768 94767->94768 94769 30d2c6 RegQueryValueExW 94767->94769 94768->94757 94770 30d2e7 94769->94770 94771 30d2fc RegCloseKey 94769->94771 94770->94771 94771->94768 94772 315dfd 94773 315e09 __wsopen_helper 94772->94773 94809 317eeb GetStartupInfoW 94773->94809 94776 315e66 94778 315e71 94776->94778 94896 315f4d 47 API calls 3 library calls 94776->94896 94777 315e0e 94811 319ca7 GetProcessHeap 94777->94811 94812 317b47 94778->94812 94781 315e77 94782 315e82 __RTC_Initialize 94781->94782 94897 315f4d 47 API calls 3 library calls 94781->94897 94833 31acb3 94782->94833 94785 315e91 94786 315e9d GetCommandLineW 94785->94786 94898 315f4d 47 API calls 3 library calls 94785->94898 94852 322e7d GetEnvironmentStringsW 94786->94852 94789 315e9c 94789->94786 94793 315ec2 94865 322cb4 94793->94865 94796 315ec8 94800 315ed3 94796->94800 94900 31115b 47 API calls 3 library calls 94796->94900 94799 315edb 94801 315ee6 __wwincmdln 94799->94801 94901 31115b 47 API calls 3 library calls 94799->94901 94879 311195 94800->94879 94883 2f3a0f 94801->94883 94804 315efa 94805 315f09 94804->94805 94902 3113f1 47 API calls _doexit 94804->94902 94903 311186 47 API calls _doexit 94805->94903 94808 315f0e __wsopen_helper 94810 317f01 94809->94810 94810->94777 94811->94776 94904 31123a 30 API calls 2 library calls 94812->94904 94814 317b4c 94905 317e23 InitializeCriticalSectionAndSpinCount 94814->94905 94816 317b51 94817 317b55 94816->94817 94907 317e6d TlsAlloc 94816->94907 94906 317bbd 50 API calls 2 library calls 94817->94906 94820 317b67 94820->94817 94822 317b72 94820->94822 94821 317b5a 94821->94781 94908 316986 94822->94908 94825 317bb4 94916 317bbd 50 API calls 2 library calls 94825->94916 94828 317b93 94828->94825 94830 317b99 94828->94830 94829 317bb9 94829->94781 94915 317a94 47 API calls 4 library calls 94830->94915 94832 317ba1 GetCurrentThreadId 94832->94781 94834 31acbf __wsopen_helper 94833->94834 94835 317cf4 __lock 47 API calls 94834->94835 94836 31acc6 94835->94836 94837 316986 __calloc_crt 47 API calls 94836->94837 94838 31acd7 94837->94838 94839 31ad42 GetStartupInfoW 94838->94839 94840 31ace2 __wsopen_helper @_EH4_CallFilterFunc@8 94838->94840 94847 31ae80 94839->94847 94849 31ad57 94839->94849 94840->94785 94841 31af44 94925 31af58 LeaveCriticalSection _doexit 94841->94925 94843 31aec9 GetStdHandle 94843->94847 94844 316986 __calloc_crt 47 API calls 94844->94849 94845 31aedb GetFileType 94845->94847 94846 31ada5 94846->94847 94850 31ade5 InitializeCriticalSectionAndSpinCount 94846->94850 94851 31add7 GetFileType 94846->94851 94847->94841 94847->94843 94847->94845 94848 31af08 InitializeCriticalSectionAndSpinCount 94847->94848 94848->94847 94849->94844 94849->94846 94849->94847 94850->94846 94851->94846 94851->94850 94853 315ead 94852->94853 94854 322e8e 94852->94854 94859 322a7b GetModuleFileNameW 94853->94859 94926 3169d0 47 API calls _W_store_winword 94854->94926 94857 322eca FreeEnvironmentStringsW 94857->94853 94858 322eb4 _memcpy_s 94858->94857 94860 322aaf _wparse_cmdline 94859->94860 94861 315eb7 94860->94861 94862 322ae9 94860->94862 94861->94793 94899 31115b 47 API calls 3 library calls 94861->94899 94927 3169d0 47 API calls _W_store_winword 94862->94927 94864 322aef _wparse_cmdline 94864->94861 94866 322cc5 94865->94866 94867 322ccd __wsetenvp 94865->94867 94866->94796 94868 316986 __calloc_crt 47 API calls 94867->94868 94875 322cf6 __wsetenvp 94868->94875 94869 322d4d 94870 311c9d _free 47 API calls 94869->94870 94870->94866 94871 316986 __calloc_crt 47 API calls 94871->94875 94872 322d72 94874 311c9d _free 47 API calls 94872->94874 94874->94866 94875->94866 94875->94869 94875->94871 94875->94872 94876 322d89 94875->94876 94928 322567 47 API calls __wsopen_helper 94875->94928 94929 316e20 IsProcessorFeaturePresent 94876->94929 94878 322d95 94878->94796 94880 3111a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 94879->94880 94882 3111e0 __IsNonwritableInCurrentImage 94880->94882 94944 310f0a 52 API calls __cinit 94880->94944 94882->94799 94884 2f3a29 94883->94884 94885 361ebf 94883->94885 94886 2f3a63 IsThemeActive 94884->94886 94945 311405 94886->94945 94890 2f3a8f 94957 2f3adb SystemParametersInfoW SystemParametersInfoW 94890->94957 94892 2f3a9b 94958 2f3d19 94892->94958 94894 2f3aa3 SystemParametersInfoW 94895 2f3ac8 94894->94895 94895->94804 94896->94778 94897->94782 94898->94789 94902->94805 94903->94808 94904->94814 94905->94816 94906->94821 94907->94820 94910 31698d 94908->94910 94911 3169ca 94910->94911 94912 3169ab Sleep 94910->94912 94917 3230aa 94910->94917 94911->94825 94914 317ec9 TlsSetValue 94911->94914 94913 3169c2 94912->94913 94913->94910 94913->94911 94914->94828 94915->94832 94916->94829 94918 3230b5 94917->94918 94923 3230d0 __calloc_impl 94917->94923 94919 3230c1 94918->94919 94918->94923 94924 317c0e 47 API calls __getptd_noexit 94919->94924 94921 3230e0 HeapAlloc 94922 3230c6 94921->94922 94921->94923 94922->94910 94923->94921 94923->94922 94924->94922 94925->94840 94926->94858 94927->94864 94928->94875 94930 316e2b 94929->94930 94935 316cb5 94930->94935 94934 316e46 94934->94878 94936 316ccf _memset ___raise_securityfailure 94935->94936 94937 316cef IsDebuggerPresent 94936->94937 94943 3181ac SetUnhandledExceptionFilter UnhandledExceptionFilter 94937->94943 94939 31a70c __wtof_l 6 API calls 94940 316dd6 94939->94940 94942 318197 GetCurrentProcess TerminateProcess 94940->94942 94941 316db3 ___raise_securityfailure 94941->94939 94942->94934 94943->94941 94944->94882 94946 317cf4 __lock 47 API calls 94945->94946 94947 311410 94946->94947 95010 317e58 LeaveCriticalSection 94947->95010 94949 2f3a88 94950 31146d 94949->94950 94951 311491 94950->94951 94952 311477 94950->94952 94951->94890 94952->94951 95011 317c0e 47 API calls __getptd_noexit 94952->95011 94954 311481 95012 316e10 8 API calls __wsopen_helper 94954->95012 94956 31148c 94956->94890 94957->94892 94959 2f3d26 __ftell_nolock 94958->94959 94960 2fd7f7 48 API calls 94959->94960 94961 2f3d31 GetCurrentDirectoryW 94960->94961 95013 2f61ca 94961->95013 94963 2f3d57 IsDebuggerPresent 94964 361cc1 MessageBoxA 94963->94964 94965 2f3d65 94963->94965 94967 361cd9 94964->94967 94965->94967 94968 2f3d82 94965->94968 94996 2f3e3a 94965->94996 94966 2f3e41 SetCurrentDirectoryW 94970 2f3e4e Mailbox 94966->94970 95138 30c682 48 API calls 94967->95138 95087 2f40e5 94968->95087 94970->94894 94972 361ce9 94977 361cff SetCurrentDirectoryW 94972->94977 94977->94970 94996->94966 95010->94949 95011->94954 95012->94956 95140 30e99b 95013->95140 95017 2f61eb 95018 2f5374 50 API calls 95017->95018 95019 2f61ff 95018->95019 95020 2fce19 48 API calls 95019->95020 95021 2f620c 95020->95021 95157 2f39db 95021->95157 95023 2f6216 Mailbox 95024 2f6eed 48 API calls 95023->95024 95025 2f622b 95024->95025 95169 2f9048 95025->95169 95028 2fce19 48 API calls 95029 2f6244 95028->95029 95030 2fd6e9 55 API calls 95029->95030 95031 2f6254 Mailbox 95030->95031 95032 2fce19 48 API calls 95031->95032 95033 2f627c 95032->95033 95034 2fd6e9 55 API calls 95033->95034 95035 2f628f Mailbox 95034->95035 95036 2fce19 48 API calls 95035->95036 95037 2f62a0 95036->95037 95038 2fd645 53 API calls 95037->95038 95039 2f62b2 Mailbox 95038->95039 95040 2fd7f7 48 API calls 95039->95040 95041 2f62c5 95040->95041 95172 2f63fc 95041->95172 95045 2f62df 95046 2f62e9 95045->95046 95047 361c08 95045->95047 95049 310fa7 _W_store_winword 59 API calls 95046->95049 95048 2f63fc 48 API calls 95047->95048 95050 361c1c 95048->95050 95051 2f62f4 95049->95051 95054 2f63fc 48 API calls 95050->95054 95051->95050 95052 2f62fe 95051->95052 95053 310fa7 _W_store_winword 59 API calls 95052->95053 95055 2f6309 95053->95055 95056 361c38 95054->95056 95055->95056 95057 2f6313 95055->95057 95059 2f5374 50 API calls 95056->95059 95058 310fa7 _W_store_winword 59 API calls 95057->95058 95060 2f631e 95058->95060 95061 361c5d 95059->95061 95063 2f635f 95060->95063 95065 361c86 95060->95065 95068 2f63fc 48 API calls 95060->95068 95062 2f63fc 48 API calls 95061->95062 95064 361c69 95062->95064 95063->95065 95066 2f636c 95063->95066 95067 2f6eed 48 API calls 95064->95067 95069 2f6eed 48 API calls 95065->95069 95070 30c050 48 API calls 95066->95070 95071 361c77 95067->95071 95072 2f6342 95068->95072 95073 361ca8 95069->95073 95074 2f6384 95070->95074 95075 2f63fc 48 API calls 95071->95075 95076 2f6eed 48 API calls 95072->95076 95077 2f63fc 48 API calls 95073->95077 95078 301b90 48 API calls 95074->95078 95075->95065 95079 2f6350 95076->95079 95080 361cb5 95077->95080 95084 2f6394 95078->95084 95081 2f63fc 48 API calls 95079->95081 95080->95080 95081->95063 95082 301b90 48 API calls 95082->95084 95084->95082 95085 2f63fc 48 API calls 95084->95085 95086 2f63d6 Mailbox 95084->95086 95188 2f6b68 48 API calls 95084->95188 95085->95084 95086->94963 95088 2f40f2 __ftell_nolock 95087->95088 95089 2f410b 95088->95089 95090 36370e _memset 95088->95090 95091 2f660f 49 API calls 95089->95091 95092 36372a GetOpenFileNameW 95090->95092 95093 2f4114 95091->95093 95094 363779 95092->95094 95230 2f40a7 95093->95230 95096 2f6a63 48 API calls 95094->95096 95098 36378e 95096->95098 95098->95098 95138->94972 95141 2fd7f7 48 API calls 95140->95141 95142 2f61db 95141->95142 95143 2f6009 95142->95143 95144 2f6016 __ftell_nolock 95143->95144 95145 2f6a63 48 API calls 95144->95145 95150 2f617c Mailbox 95144->95150 95147 2f6048 95145->95147 95156 2f607e Mailbox 95147->95156 95189 2f61a6 95147->95189 95148 2f61a6 48 API calls 95148->95156 95149 2f614f 95149->95150 95151 2fce19 48 API calls 95149->95151 95150->95017 95153 2f6170 95151->95153 95152 2fce19 48 API calls 95152->95156 95154 2f64cf 48 API calls 95153->95154 95154->95150 95155 2f64cf 48 API calls 95155->95156 95156->95148 95156->95149 95156->95150 95156->95152 95156->95155 95158 2f41a9 136 API calls 95157->95158 95159 2f39fe 95158->95159 95160 2f3a06 95159->95160 95192 33c396 95159->95192 95160->95023 95163 362ff0 95165 311c9d _free 47 API calls 95163->95165 95164 2f4252 84 API calls 95164->95163 95166 362ffd 95165->95166 95167 2f4252 84 API calls 95166->95167 95168 363006 95167->95168 95168->95168 95170 30f4ea 48 API calls 95169->95170 95171 2f6237 95170->95171 95171->95028 95173 2f641f 95172->95173 95174 2f6406 95172->95174 95176 2f6a63 48 API calls 95173->95176 95175 2f6eed 48 API calls 95174->95175 95177 2f62d1 95175->95177 95176->95177 95178 310fa7 95177->95178 95179 310fb3 95178->95179 95180 311028 95178->95180 95187 310fd8 95179->95187 95227 317c0e 47 API calls __getptd_noexit 95179->95227 95229 31103a 59 API calls 3 library calls 95180->95229 95183 311035 95183->95045 95184 310fbf 95228 316e10 8 API calls __wsopen_helper 95184->95228 95186 310fca 95186->95045 95187->95045 95188->95084 95190 2fbdfa 48 API calls 95189->95190 95191 2f61b1 95190->95191 95191->95147 95193 2f4517 83 API calls 95192->95193 95194 33c405 95193->95194 95195 33c56d 94 API calls 95194->95195 95196 33c417 95195->95196 95197 2f44ed 64 API calls 95196->95197 95198 33c41b 95196->95198 95199 33c432 95197->95199 95198->95163 95198->95164 95200 2f44ed 64 API calls 95199->95200 95201 33c442 95200->95201 95202 2f44ed 64 API calls 95201->95202 95203 33c45d 95202->95203 95204 2f44ed 64 API calls 95203->95204 95205 33c478 95204->95205 95206 2f4517 83 API calls 95205->95206 95207 33c48f 95206->95207 95208 31395c _W_store_winword 47 API calls 95207->95208 95209 33c496 95208->95209 95210 31395c _W_store_winword 47 API calls 95209->95210 95211 33c4a0 95210->95211 95212 2f44ed 64 API calls 95211->95212 95213 33c4b4 95212->95213 95214 33bf5a GetSystemTimeAsFileTime 95213->95214 95215 33c4c7 95214->95215 95216 33c4f1 95215->95216 95217 33c4dc 95215->95217 95218 33c4f7 95216->95218 95219 33c556 95216->95219 95220 311c9d _free 47 API calls 95217->95220 95221 33b965 118 API calls 95218->95221 95222 311c9d _free 47 API calls 95219->95222 95223 33c4e2 95220->95223 95224 33c54e 95221->95224 95222->95198 95225 311c9d _free 47 API calls 95223->95225 95226 311c9d _free 47 API calls 95224->95226 95225->95198 95226->95198 95227->95184 95228->95186 95229->95183 95231 31f8a0 __ftell_nolock 95230->95231 95232 2f40b4 GetLongPathNameW 95231->95232 95233 2f6a63 48 API calls 95232->95233 95234 2f40dc 95233->95234 95467 36197b 95472 30dd94 95467->95472 95471 36198a 95473 30f4ea 48 API calls 95472->95473 95474 30dd9c 95473->95474 95475 30ddb0 95474->95475 95480 30df3d 95474->95480 95479 310f0a 52 API calls __cinit 95475->95479 95479->95471 95481 30df46 95480->95481 95483 30dda8 95480->95483 95512 310f0a 52 API calls __cinit 95481->95512 95484 30ddc0 95483->95484 95485 2fd7f7 48 API calls 95484->95485 95486 30ddd7 GetVersionExW 95485->95486 95487 2f6a63 48 API calls 95486->95487 95488 30de1a 95487->95488 95513 30dfb4 95488->95513 95491 2f6571 48 API calls 95494 30de2e 95491->95494 95493 3624c8 95494->95493 95517 30df77 95494->95517 95496 30dea4 GetCurrentProcess 95526 30df5f LoadLibraryA GetProcAddress 95496->95526 95497 30debb 95498 30df31 GetSystemInfo 95497->95498 95499 30dee3 95497->95499 95501 30df0e 95498->95501 95520 30e00c 95499->95520 95504 30df21 95501->95504 95505 30df1c FreeLibrary 95501->95505 95504->95475 95505->95504 95506 30df29 GetSystemInfo 95508 30df03 95506->95508 95507 30def9 95523 30dff4 95507->95523 95508->95501 95511 30df09 FreeLibrary 95508->95511 95511->95501 95512->95483 95514 30dfbd 95513->95514 95515 2fb18b 48 API calls 95514->95515 95516 30de22 95515->95516 95516->95491 95527 30df89 95517->95527 95531 30e01e 95520->95531 95524 30e00c 2 API calls 95523->95524 95525 30df01 GetNativeSystemInfo 95524->95525 95525->95508 95526->95497 95528 30dea0 95527->95528 95529 30df92 LoadLibraryA 95527->95529 95528->95496 95528->95497 95529->95528 95530 30dfa3 GetProcAddress 95529->95530 95530->95528 95532 30def1 95531->95532 95533 30e027 LoadLibraryA 95531->95533 95532->95506 95532->95507 95533->95532 95534 30e038 GetProcAddress 95533->95534 95534->95532 95535 2f3742 95536 2f374b 95535->95536 95537 2f37c6 95536->95537 95538 2f3769 95536->95538 95539 2f37c8 95536->95539 95540 2f37ab DefWindowProcW 95537->95540 95543 2f382c PostQuitMessage 95538->95543 95544 2f3776 95538->95544 95541 2f37ce 95539->95541 95542 361e00 95539->95542 95550 2f37b9 95540->95550 95545 2f37f6 SetTimer RegisterWindowMessageW 95541->95545 95546 2f37d3 95541->95546 95590 2f2ff6 16 API calls 95542->95590 95543->95550 95548 361e88 95544->95548 95549 2f3781 95544->95549 95545->95550 95554 2f381f CreatePopupMenu 95545->95554 95551 361da3 95546->95551 95552 2f37da KillTimer 95546->95552 95595 334ddd 60 API calls _memset 95548->95595 95555 2f3789 95549->95555 95556 2f3836 95549->95556 95558 361ddc MoveWindow 95551->95558 95559 361da8 95551->95559 95587 2f3847 Shell_NotifyIconW _memset 95552->95587 95553 361e27 95591 30e312 335 API calls Mailbox 95553->95591 95554->95550 95562 361e6d 95555->95562 95563 2f3794 95555->95563 95580 30eb83 95556->95580 95558->95550 95566 361dac 95559->95566 95567 361dcb SetFocus 95559->95567 95562->95540 95594 32a5f3 48 API calls 95562->95594 95569 2f379f 95563->95569 95570 361e58 95563->95570 95564 361e9a 95564->95540 95564->95550 95566->95569 95571 361db5 95566->95571 95567->95550 95568 2f37ed 95588 2f390f DeleteObject DestroyWindow Mailbox 95568->95588 95569->95540 95592 2f3847 Shell_NotifyIconW _memset 95569->95592 95593 3355bd 70 API calls _memset 95570->95593 95589 2f2ff6 16 API calls 95571->95589 95576 361e68 95576->95550 95578 361e4c 95579 2f4ffc 67 API calls 95578->95579 95579->95537 95581 30eb9a _memset 95580->95581 95582 30ec1c 95580->95582 95583 2f51af 50 API calls 95581->95583 95582->95550 95585 30ebc1 95583->95585 95584 30ec05 KillTimer SetTimer 95584->95582 95585->95584 95586 363c7a Shell_NotifyIconW 95585->95586 95586->95584 95587->95568 95588->95550 95589->95550 95590->95553 95591->95569 95592->95578 95593->95576 95594->95537 95595->95564 95596 3619cb 95601 2f2322 95596->95601 95598 3619d1 95634 310f0a 52 API calls __cinit 95598->95634 95600 3619db 95602 2f2344 95601->95602 95635 2f26df 95602->95635 95607 2fd7f7 48 API calls 95608 2f2384 95607->95608 95609 2fd7f7 48 API calls 95608->95609 95610 2f238e 95609->95610 95611 2fd7f7 48 API calls 95610->95611 95612 2f2398 95611->95612 95613 2fd7f7 48 API calls 95612->95613 95614 2f23de 95613->95614 95615 2fd7f7 48 API calls 95614->95615 95616 2f24c1 95615->95616 95643 2f263f 95616->95643 95620 2f24f1 95621 2fd7f7 48 API calls 95620->95621 95622 2f24fb 95621->95622 95672 2f2745 95622->95672 95624 2f2546 95625 2f2556 GetStdHandle 95624->95625 95626 36501d 95625->95626 95627 2f25b1 95625->95627 95626->95627 95629 365026 95626->95629 95628 2f25b7 CoInitialize 95627->95628 95628->95598 95679 3392d4 53 API calls 95629->95679 95631 36502d 95680 3399f9 CreateThread 95631->95680 95633 365039 CloseHandle 95633->95628 95634->95600 95681 2f2854 95635->95681 95638 2f6a63 48 API calls 95639 2f234a 95638->95639 95640 2f272e 95639->95640 95695 2f27ec 6 API calls 95640->95695 95642 2f237a 95642->95607 95644 2fd7f7 48 API calls 95643->95644 95645 2f264f 95644->95645 95646 2fd7f7 48 API calls 95645->95646 95647 2f2657 95646->95647 95696 2f26a7 95647->95696 95650 2f26a7 48 API calls 95651 2f2667 95650->95651 95652 2fd7f7 48 API calls 95651->95652 95653 2f2672 95652->95653 95654 30f4ea 48 API calls 95653->95654 95655 2f24cb 95654->95655 95656 2f22a4 95655->95656 95657 2f22b2 95656->95657 95658 2fd7f7 48 API calls 95657->95658 95659 2f22bd 95658->95659 95660 2fd7f7 48 API calls 95659->95660 95661 2f22c8 95660->95661 95662 2fd7f7 48 API calls 95661->95662 95663 2f22d3 95662->95663 95664 2fd7f7 48 API calls 95663->95664 95665 2f22de 95664->95665 95666 2f26a7 48 API calls 95665->95666 95667 2f22e9 95666->95667 95668 30f4ea 48 API calls 95667->95668 95669 2f22f0 95668->95669 95670 361fe7 95669->95670 95671 2f22f9 RegisterWindowMessageW 95669->95671 95671->95620 95673 2f2755 95672->95673 95674 365f4d 95672->95674 95675 30f4ea 48 API calls 95673->95675 95701 33c942 50 API calls 95674->95701 95677 2f275d 95675->95677 95677->95624 95678 365f58 95679->95631 95680->95633 95702 3399df 54 API calls 95680->95702 95688 2f2870 95681->95688 95684 2f2870 48 API calls 95685 2f2864 95684->95685 95686 2fd7f7 48 API calls 95685->95686 95687 2f2716 95686->95687 95687->95638 95689 2fd7f7 48 API calls 95688->95689 95690 2f287b 95689->95690 95691 2fd7f7 48 API calls 95690->95691 95692 2f2883 95691->95692 95693 2fd7f7 48 API calls 95692->95693 95694 2f285c 95693->95694 95694->95684 95695->95642 95697 2fd7f7 48 API calls 95696->95697 95698 2f26b0 95697->95698 95699 2fd7f7 48 API calls 95698->95699 95700 2f265f 95699->95700 95700->95650 95701->95678 95703 368eb8 95707 33a635 95703->95707 95705 368ec3 95706 33a635 84 API calls 95705->95706 95706->95705 95708 33a66f 95707->95708 95713 33a642 95707->95713 95708->95705 95709 33a671 95719 30ec4e 81 API calls 95709->95719 95710 33a676 95712 2f936c 81 API calls 95710->95712 95714 33a67d 95712->95714 95713->95708 95713->95709 95713->95710 95716 33a669 95713->95716 95715 2f510d 48 API calls 95714->95715 95715->95708 95718 304525 61 API calls _memcpy_s 95716->95718 95718->95708 95719->95710 95720 2ff030 95723 303b70 95720->95723 95722 2ff03c 95724 3042a5 95723->95724 95725 303bc8 95723->95725 95815 33cc5c 86 API calls 4 library calls 95724->95815 95726 303bef 95725->95726 95728 366fd1 95725->95728 95731 366f7e 95725->95731 95737 366f9b 95725->95737 95727 30f4ea 48 API calls 95726->95727 95729 303c18 95727->95729 95803 34ceca 335 API calls Mailbox 95728->95803 95733 30f4ea 48 API calls 95729->95733 95731->95726 95734 366f87 95731->95734 95732 366fbe 95802 33cc5c 86 API calls 4 library calls 95732->95802 95784 303c2c _memcpy_s __wsetenvp 95733->95784 95800 34d552 335 API calls Mailbox 95734->95800 95737->95732 95801 34da0e 335 API calls 2 library calls 95737->95801 95740 3673b0 95740->95722 95741 36737a 95821 33cc5c 86 API calls 4 library calls 95741->95821 95742 367297 95811 33cc5c 86 API calls 4 library calls 95742->95811 95745 30dce0 53 API calls 95745->95784 95747 3040df 95812 33cc5c 86 API calls 4 library calls 95747->95812 95749 36707e 95804 33cc5c 86 API calls 4 library calls 95749->95804 95751 2fd6e9 55 API calls 95751->95784 95754 2fd645 53 API calls 95754->95784 95756 30f4ea 48 API calls 95756->95784 95757 303f2b 95757->95722 95759 3672d2 95813 33cc5c 86 API calls 4 library calls 95759->95813 95761 2ffe30 335 API calls 95761->95784 95763 367350 95819 33cc5c 86 API calls 4 library calls 95763->95819 95764 3672e9 95814 33cc5c 86 API calls 4 library calls 95764->95814 95765 367363 95820 33cc5c 86 API calls 4 library calls 95765->95820 95769 3042f2 95822 33cc5c 86 API calls 4 library calls 95769->95822 95770 2f6a63 48 API calls 95770->95784 95772 30c050 48 API calls 95772->95784 95773 36714c 95808 34ccdc 48 API calls 95773->95808 95775 36733f 95818 33cc5c 86 API calls 4 library calls 95775->95818 95777 2fd286 48 API calls 95777->95784 95779 3671a1 95810 30c15c 48 API calls 95779->95810 95781 30ee75 48 API calls 95781->95784 95782 2f6eed 48 API calls 95782->95784 95784->95724 95784->95741 95784->95742 95784->95745 95784->95747 95784->95749 95784->95751 95784->95754 95784->95756 95784->95757 95784->95759 95784->95761 95784->95763 95784->95764 95784->95765 95784->95769 95784->95770 95784->95772 95784->95773 95784->95775 95784->95777 95784->95781 95784->95782 95786 3671e1 95784->95786 95795 2fd9a0 53 API calls __cinit 95784->95795 95796 2fd83d 53 API calls 95784->95796 95797 2fcdb9 48 API calls 95784->95797 95798 30c15c 48 API calls 95784->95798 95799 30becb 335 API calls 95784->95799 95805 2fdcae 50 API calls Mailbox 95784->95805 95806 34ccdc 48 API calls 95784->95806 95807 33a1eb 50 API calls 95784->95807 95786->95757 95817 33cc5c 86 API calls 4 library calls 95786->95817 95788 36715f 95788->95779 95809 34ccdc 48 API calls 95788->95809 95789 3671ce 95790 30c050 48 API calls 95789->95790 95792 3671d6 95790->95792 95791 3671ab 95791->95724 95791->95789 95792->95786 95793 367313 95792->95793 95816 33cc5c 86 API calls 4 library calls 95793->95816 95795->95784 95796->95784 95797->95784 95798->95784 95799->95784 95800->95757 95801->95732 95802->95728 95803->95784 95804->95757 95805->95784 95806->95784 95807->95784 95808->95788 95809->95788 95810->95791 95811->95747 95812->95757 95813->95764 95814->95757 95815->95757 95816->95757 95817->95757 95818->95757 95819->95757 95820->95757 95821->95757 95822->95740 95823 2fef80 95824 303b70 335 API calls 95823->95824 95825 2fef8c 95824->95825

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 856 31b043-31b080 call 31f8a0 859 31b082-31b084 856->859 860 31b089-31b08b 856->860 861 31b860-31b86c call 31a70c 859->861 862 31b08d-31b0a7 call 317bda call 317c0e call 316e10 860->862 863 31b0ac-31b0d9 860->863 862->861 864 31b0e0-31b0e7 863->864 865 31b0db-31b0de 863->865 870 31b105 864->870 871 31b0e9-31b100 call 317bda call 317c0e call 316e10 864->871 865->864 869 31b10b-31b110 865->869 874 31b112-31b11c call 31f82f 869->874 875 31b11f-31b12d call 323bf2 869->875 870->869 905 31b851-31b854 871->905 874->875 886 31b133-31b145 875->886 887 31b44b-31b45d 875->887 886->887 889 31b14b-31b183 call 317a0d GetConsoleMode 886->889 890 31b463-31b473 887->890 891 31b7b8-31b7d5 WriteFile 887->891 889->887 912 31b189-31b18f 889->912 896 31b479-31b484 890->896 897 31b55a-31b55f 890->897 893 31b7e1-31b7e7 GetLastError 891->893 894 31b7d7-31b7df 891->894 899 31b7e9 893->899 894->899 903 31b81b-31b833 896->903 904 31b48a-31b49a 896->904 900 31b663-31b66e 897->900 901 31b565-31b56e 897->901 909 31b7ef-31b7f1 899->909 900->903 908 31b674 900->908 901->903 910 31b574 901->910 906 31b835-31b838 903->906 907 31b83e-31b84e call 317c0e call 317bda 903->907 913 31b4a0-31b4a3 904->913 911 31b85e-31b85f 905->911 906->907 914 31b83a-31b83c 906->914 907->905 915 31b67e-31b693 908->915 917 31b7f3-31b7f5 909->917 918 31b856-31b85c 909->918 919 31b57e-31b595 910->919 911->861 920 31b191-31b193 912->920 921 31b199-31b1bc GetConsoleCP 912->921 922 31b4a5-31b4be 913->922 923 31b4e9-31b520 WriteFile 913->923 914->911 925 31b699-31b69b 915->925 917->903 927 31b7f7-31b7fc 917->927 918->911 928 31b59b-31b59e 919->928 920->887 920->921 929 31b440-31b446 921->929 930 31b1c2-31b1ca 921->930 931 31b4c0-31b4ca 922->931 932 31b4cb-31b4e7 922->932 923->893 924 31b526-31b538 923->924 924->909 933 31b53e-31b54f 924->933 934 31b6d8-31b719 WideCharToMultiByte 925->934 935 31b69d-31b6b3 925->935 937 31b812-31b819 call 317bed 927->937 938 31b7fe-31b810 call 317c0e call 317bda 927->938 939 31b5a0-31b5b6 928->939 940 31b5de-31b627 WriteFile 928->940 929->917 941 31b1d4-31b1d6 930->941 931->932 932->913 932->923 933->904 944 31b555 933->944 934->893 948 31b71f-31b721 934->948 945 31b6b5-31b6c4 935->945 946 31b6c7-31b6d6 935->946 937->905 938->905 950 31b5b8-31b5ca 939->950 951 31b5cd-31b5dc 939->951 940->893 953 31b62d-31b645 940->953 942 31b36b-31b36e 941->942 943 31b1dc-31b1fe 941->943 956 31b370-31b373 942->956 957 31b375-31b3a2 942->957 954 31b200-31b215 943->954 955 31b217-31b223 call 311688 943->955 944->909 945->946 946->925 946->934 958 31b727-31b75a WriteFile 948->958 950->951 951->928 951->940 953->909 961 31b64b-31b658 953->961 963 31b271-31b283 call 3240f7 954->963 976 31b225-31b239 955->976 977 31b269-31b26b 955->977 956->957 965 31b3a8-31b3ab 956->965 957->965 966 31b77a-31b78e GetLastError 958->966 967 31b75c-31b776 958->967 961->919 962 31b65e 961->962 962->909 987 31b435-31b43b 963->987 988 31b289 963->988 970 31b3b2-31b3c5 call 325884 965->970 971 31b3ad-31b3b0 965->971 975 31b794-31b796 966->975 967->958 973 31b778 967->973 970->893 990 31b3cb-31b3d5 970->990 971->970 978 31b407-31b40a 971->978 973->975 975->899 981 31b798-31b7b0 975->981 984 31b412-31b42d 976->984 985 31b23f-31b254 call 3240f7 976->985 977->963 978->941 983 31b410 978->983 981->915 982 31b7b6 981->982 982->909 983->987 984->987 985->987 998 31b25a-31b267 985->998 987->899 991 31b28f-31b2c4 WideCharToMultiByte 988->991 994 31b3d7-31b3ee call 325884 990->994 995 31b3fb-31b401 990->995 991->987 992 31b2ca-31b2f0 WriteFile 991->992 992->893 997 31b2f6-31b30e 992->997 994->893 1001 31b3f4-31b3f5 994->1001 995->978 997->987 1000 31b314-31b31b 997->1000 998->991 1000->995 1002 31b321-31b34c WriteFile 1000->1002 1001->995 1002->893 1003 31b352-31b359 1002->1003 1003->987 1004 31b35f-31b366 1003->1004 1004->995
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ec333b76d9f78b58e7bcb59f7d03c6d391bb8fc57d47357d7ac423b58d17889a
                                • Instruction ID: 96af97e6323cb4486b45c4f3216e1f673422309d01bf311a4607f34259f57e13
                                • Opcode Fuzzy Hash: ec333b76d9f78b58e7bcb59f7d03c6d391bb8fc57d47357d7ac423b58d17889a
                                • Instruction Fuzzy Hash: 97325F75A022288FDB2A8F15DC416E9B7B9FF4A310F5941D9E40AE7A91D7309EC0CF52

                                Control-flow Graph

                                APIs
                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,002F3AA3,?), ref: 002F3D45
                                • IsDebuggerPresent.KERNEL32(?,?,?,?,002F3AA3,?), ref: 002F3D57
                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,003B1148,003B1130,?,?,?,?,002F3AA3,?), ref: 002F3DC8
                                  • Part of subcall function 002F6430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,002F3DEE,003B1148,?,?,?,?,?,002F3AA3,?), ref: 002F6471
                                • SetCurrentDirectoryW.KERNEL32(?,?,?,002F3AA3,?), ref: 002F3E48
                                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,003A28F4,00000010), ref: 00361CCE
                                • SetCurrentDirectoryW.KERNEL32(?,003B1148,?,?,?,?,?,002F3AA3,?), ref: 00361D06
                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,0038DAB4,003B1148,?,?,?,?,?,002F3AA3,?), ref: 00361D89
                                • ShellExecuteW.SHELL32(00000000,?,?,?,?,002F3AA3), ref: 00361D90
                                  • Part of subcall function 002F3E6E: GetSysColorBrush.USER32(0000000F), ref: 002F3E79
                                  • Part of subcall function 002F3E6E: LoadCursorW.USER32(00000000,00007F00), ref: 002F3E88
                                  • Part of subcall function 002F3E6E: LoadIconW.USER32(00000063), ref: 002F3E9E
                                  • Part of subcall function 002F3E6E: LoadIconW.USER32(000000A4), ref: 002F3EB0
                                  • Part of subcall function 002F3E6E: LoadIconW.USER32(000000A2), ref: 002F3EC2
                                  • Part of subcall function 002F3E6E: RegisterClassExW.USER32(?), ref: 002F3F30
                                  • Part of subcall function 002F36B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 002F36E6
                                  • Part of subcall function 002F36B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 002F3707
                                  • Part of subcall function 002F36B8: ShowWindow.USER32(00000000,?,?,?,?,002F3AA3,?), ref: 002F371B
                                  • Part of subcall function 002F36B8: ShowWindow.USER32(00000000,?,?,?,?,002F3AA3,?), ref: 002F3724
                                  • Part of subcall function 002F4FFC: _memset.LIBCMT ref: 002F5022
                                  • Part of subcall function 002F4FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 002F50CB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                • String ID: ():$This is a third-party compiled AutoIt script.$runas
                                • API String ID: 438480954-1547992737
                                • Opcode ID: 61519711d9393986cb13e64f48831e9781e49aba4a19fe73416319f37e7c4543
                                • Instruction ID: 57a4f6b4eea4d24bb50e058a00521c287f273d1ad188117a77dde817c6922c3c
                                • Opcode Fuzzy Hash: 61519711d9393986cb13e64f48831e9781e49aba4a19fe73416319f37e7c4543
                                • Instruction Fuzzy Hash: 8551F334A2424DBACB13EBB8DC56DFEBB7D9F05B88F004274F70166192DA7446558F21

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1288 30ddc0-30de4f call 2fd7f7 GetVersionExW call 2f6a63 call 30dfb4 call 2f6571 1297 30de55-30de56 1288->1297 1298 3624c8-3624cb 1288->1298 1299 30de92-30dea2 call 30df77 1297->1299 1300 30de58-30de63 1297->1300 1301 3624e4-3624e8 1298->1301 1302 3624cd 1298->1302 1319 30dea4-30dec1 GetCurrentProcess call 30df5f 1299->1319 1320 30dec7-30dee1 1299->1320 1305 36244e-362454 1300->1305 1306 30de69-30de6b 1300->1306 1303 3624d3-3624dc 1301->1303 1304 3624ea-3624f3 1301->1304 1308 3624d0 1302->1308 1303->1301 1304->1308 1311 3624f5-3624f8 1304->1311 1309 362456-362459 1305->1309 1310 36245e-362464 1305->1310 1312 30de71-30de74 1306->1312 1313 362469-362475 1306->1313 1308->1303 1309->1299 1310->1299 1311->1303 1317 362495-362498 1312->1317 1318 30de7a-30de89 1312->1318 1315 362477-36247a 1313->1315 1316 36247f-362485 1313->1316 1315->1299 1316->1299 1317->1299 1323 36249e-3624b3 1317->1323 1324 36248a-362490 1318->1324 1325 30de8f 1318->1325 1319->1320 1339 30dec3 1319->1339 1321 30df31-30df3b GetSystemInfo 1320->1321 1322 30dee3-30def7 call 30e00c 1320->1322 1327 30df0e-30df1a 1321->1327 1336 30df29-30df2f GetSystemInfo 1322->1336 1337 30def9-30df01 call 30dff4 GetNativeSystemInfo 1322->1337 1329 3624b5-3624b8 1323->1329 1330 3624bd-3624c3 1323->1330 1324->1299 1325->1299 1333 30df21-30df26 1327->1333 1334 30df1c-30df1f FreeLibrary 1327->1334 1329->1299 1330->1299 1334->1333 1338 30df03-30df07 1336->1338 1337->1338 1338->1327 1342 30df09-30df0c FreeLibrary 1338->1342 1339->1320 1342->1327
                                APIs
                                • GetVersionExW.KERNEL32(?), ref: 0030DDEC
                                • GetCurrentProcess.KERNEL32(00000000,0038DC38,?,?), ref: 0030DEAC
                                • GetNativeSystemInfo.KERNELBASE(?,0038DC38,?,?), ref: 0030DF01
                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 0030DF0C
                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 0030DF1F
                                • GetSystemInfo.KERNEL32(?,0038DC38,?,?), ref: 0030DF29
                                • GetSystemInfo.KERNEL32(?,0038DC38,?,?), ref: 0030DF35
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                • String ID:
                                • API String ID: 3851250370-0
                                • Opcode ID: 6e7d60cf12e7c5dd7e440b0b7e30f746a7c86a73a8f078cb06e9a7698c7cfeff
                                • Instruction ID: a46ae0b062e73444e8c1edaa8bd8ba85ba6d81966f9a67b606c188152266c583
                                • Opcode Fuzzy Hash: 6e7d60cf12e7c5dd7e440b0b7e30f746a7c86a73a8f078cb06e9a7698c7cfeff
                                • Instruction Fuzzy Hash: 5961A67180A384DFCF17CFA894D15EABFB46F29300F1A89D9D8859F24BC624C949CB65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1360 2f406b-2f4083 CreateStreamOnHGlobal 1361 2f4085-2f409c FindResourceExW 1360->1361 1362 2f40a3-2f40a6 1360->1362 1363 364f16-364f25 LoadResource 1361->1363 1364 2f40a2 1361->1364 1363->1364 1365 364f2b-364f39 SizeofResource 1363->1365 1364->1362 1365->1364 1366 364f3f-364f4a LockResource 1365->1366 1366->1364 1367 364f50-364f6e 1366->1367 1367->1364
                                APIs
                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,002F449E,?,?,00000000,00000001), ref: 002F407B
                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,002F449E,?,?,00000000,00000001), ref: 002F4092
                                • LoadResource.KERNEL32(?,00000000,?,?,002F449E,?,?,00000000,00000001,?,?,?,?,?,?,002F41FB), ref: 00364F1A
                                • SizeofResource.KERNEL32(?,00000000,?,?,002F449E,?,?,00000000,00000001,?,?,?,?,?,?,002F41FB), ref: 00364F2F
                                • LockResource.KERNEL32(002F449E,?,?,002F449E,?,?,00000000,00000001,?,?,?,?,?,?,002F41FB,00000000), ref: 00364F42
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                • String ID: SCRIPT
                                • API String ID: 3051347437-3967369404
                                • Opcode ID: f59983e83b861c4853092941d6a54c2cfa27ed2956cd56c22d4f9cbc5f0f2cd1
                                • Instruction ID: f27f11e530d73291b5cfd8acd5d8207bd5036766fedd0121030f22d17b07ba14
                                • Opcode Fuzzy Hash: f59983e83b861c4853092941d6a54c2cfa27ed2956cd56c22d4f9cbc5f0f2cd1
                                • Instruction Fuzzy Hash: D5115E70200706BFE7369B25DC48F27BBBDEFC5B51F10452DF60696250DAB1DC419A20
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Exception@8Throwstd::exception::exception
                                • String ID: @$ ;$ ;$ ;
                                • API String ID: 3728558374-510597404
                                • Opcode ID: eeb0f9294f071f287e8fa3495fe6b16cc2ec28d79eea912eafbd1babd0fb1a11
                                • Instruction ID: f098cec0a115ff44ed5ce5b6b7a0d53992c0360b08868dea3f4f22485cbb6c08
                                • Opcode Fuzzy Hash: eeb0f9294f071f287e8fa3495fe6b16cc2ec28d79eea912eafbd1babd0fb1a11
                                • Instruction Fuzzy Hash: 7472DE74E05209DFCF16EF94C4A1ABEB7B9EF48304F15C06AE905AB291D730AE45CB91
                                APIs
                                • GetFileAttributesW.KERNELBASE(?,00362F49), ref: 00336CB9
                                • FindFirstFileW.KERNELBASE(?,?), ref: 00336CCA
                                • FindClose.KERNEL32(00000000), ref: 00336CDA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: FileFind$AttributesCloseFirst
                                • String ID:
                                • API String ID: 48322524-0
                                • Opcode ID: 3e465625fbea654560956099e789e86c3d149136a063889715c2c973a93cd6d1
                                • Instruction ID: 1cc403d7484d6ef093e82949b9124012eef03256f263744e280b0e6c8d64fea4
                                • Opcode Fuzzy Hash: 3e465625fbea654560956099e789e86c3d149136a063889715c2c973a93cd6d1
                                • Instruction Fuzzy Hash: 78E04831815515AB82216738EC4E8E9777CDE0533AF504715F575C11E0E770D94486E5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: BuffCharUpper
                                • String ID: ;
                                • API String ID: 3964851224-3233700122
                                • Opcode ID: abef8bd83c3d06ffdc71d05666296fb6245434273d65699e17781ba4a99059ae
                                • Instruction ID: aefd7f32a5dfb4d925edbbcf23314370a54381b561b1d7668bece9fba07846ab
                                • Opcode Fuzzy Hash: abef8bd83c3d06ffdc71d05666296fb6245434273d65699e17781ba4a99059ae
                                • Instruction Fuzzy Hash: F8929D70609301CFD726DF18C4A0B6AB7E9BF85308F15885DE98A8B7A2C771ED45CB52
                                APIs
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002FE959
                                • timeGetTime.WINMM ref: 002FEBFA
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002FED2E
                                • TranslateMessage.USER32(?), ref: 002FED3F
                                • DispatchMessageW.USER32(?), ref: 002FED4A
                                • LockWindowUpdate.USER32(00000000), ref: 002FED79
                                • DestroyWindow.USER32 ref: 002FED85
                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 002FED9F
                                • Sleep.KERNEL32(0000000A), ref: 00365270
                                • TranslateMessage.USER32(?), ref: 003659F7
                                • DispatchMessageW.USER32(?), ref: 00365A05
                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00365A19
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                • API String ID: 2641332412-570651680
                                • Opcode ID: 1b9bab81a11bec3233efabebd48cc28c0eb18b24d54949bc7c21bdf57bce0c1e
                                • Instruction ID: 33183806c46a4ff60ab6222333fcfa68030d842b9cdf84d0492f8a391b3614df
                                • Opcode Fuzzy Hash: 1b9bab81a11bec3233efabebd48cc28c0eb18b24d54949bc7c21bdf57bce0c1e
                                • Instruction Fuzzy Hash: 3262D370114344CFDB26DF24C895BBAB7E8BF44344F15497DFA468B2A6DBB09848CB52
                                APIs
                                • ___createFile.LIBCMT ref: 00325EC3
                                • ___createFile.LIBCMT ref: 00325F04
                                • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00325F2D
                                • __dosmaperr.LIBCMT ref: 00325F34
                                • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00325F47
                                • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00325F6A
                                • __dosmaperr.LIBCMT ref: 00325F73
                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00325F7C
                                • __set_osfhnd.LIBCMT ref: 00325FAC
                                • __lseeki64_nolock.LIBCMT ref: 00326016
                                • __close_nolock.LIBCMT ref: 0032603C
                                • __chsize_nolock.LIBCMT ref: 0032606C
                                • __lseeki64_nolock.LIBCMT ref: 0032607E
                                • __lseeki64_nolock.LIBCMT ref: 00326176
                                • __lseeki64_nolock.LIBCMT ref: 0032618B
                                • __close_nolock.LIBCMT ref: 003261EB
                                  • Part of subcall function 0031EA9C: CloseHandle.KERNELBASE(00000000,0039EEF4,00000000,?,00326041,0039EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0031EAEC
                                  • Part of subcall function 0031EA9C: GetLastError.KERNEL32(?,00326041,0039EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0031EAF6
                                  • Part of subcall function 0031EA9C: __free_osfhnd.LIBCMT ref: 0031EB03
                                  • Part of subcall function 0031EA9C: __dosmaperr.LIBCMT ref: 0031EB25
                                  • Part of subcall function 00317C0E: __getptd_noexit.LIBCMT ref: 00317C0E
                                • __lseeki64_nolock.LIBCMT ref: 0032620D
                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00326342
                                • ___createFile.LIBCMT ref: 00326361
                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0032636E
                                • __dosmaperr.LIBCMT ref: 00326375
                                • __free_osfhnd.LIBCMT ref: 00326395
                                • __invoke_watson.LIBCMT ref: 003263C3
                                • __wsopen_helper.LIBCMT ref: 003263DD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                • String ID: @
                                • API String ID: 3896587723-2766056989
                                • Opcode ID: f26a40b9626d18223482f6e1ede523b854eb554ad3bbe9b020501203b204325c
                                • Instruction ID: 709bda5e8d659d5c7446cd2974a6df3013bd080039a5e1ada5f80bb8fc5dee19
                                • Opcode Fuzzy Hash: f26a40b9626d18223482f6e1ede523b854eb554ad3bbe9b020501203b204325c
                                • Instruction Fuzzy Hash: 1D2246719046259FEB2B9F68EC46BFD7B75EF04314F294228E9119B2E1C3358E90C791

                                Control-flow Graph

                                APIs
                                • _wcscpy.LIBCMT ref: 0033FA96
                                • _wcschr.LIBCMT ref: 0033FAA4
                                • _wcscpy.LIBCMT ref: 0033FABB
                                • _wcscat.LIBCMT ref: 0033FACA
                                • _wcscat.LIBCMT ref: 0033FAE8
                                • _wcscpy.LIBCMT ref: 0033FB09
                                • __wsplitpath.LIBCMT ref: 0033FBE6
                                • _wcscpy.LIBCMT ref: 0033FC0B
                                • _wcscpy.LIBCMT ref: 0033FC1D
                                • _wcscpy.LIBCMT ref: 0033FC32
                                • _wcscat.LIBCMT ref: 0033FC47
                                • _wcscat.LIBCMT ref: 0033FC59
                                • _wcscat.LIBCMT ref: 0033FC6E
                                  • Part of subcall function 0033BFA4: _wcscmp.LIBCMT ref: 0033C03E
                                  • Part of subcall function 0033BFA4: __wsplitpath.LIBCMT ref: 0033C083
                                  • Part of subcall function 0033BFA4: _wcscpy.LIBCMT ref: 0033C096
                                  • Part of subcall function 0033BFA4: _wcscat.LIBCMT ref: 0033C0A9
                                  • Part of subcall function 0033BFA4: __wsplitpath.LIBCMT ref: 0033C0CE
                                  • Part of subcall function 0033BFA4: _wcscat.LIBCMT ref: 0033C0E4
                                  • Part of subcall function 0033BFA4: _wcscat.LIBCMT ref: 0033C0F7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                • String ID: >>>AUTOIT SCRIPT<<<$t2:
                                • API String ID: 2955681530-1248104283
                                • Opcode ID: 4bc248c0fe6b3a31712a865ba503ed05e3d0c85f2ce24d990f49a0e85401b432
                                • Instruction ID: e52f4838274de86186e050a5b2e24aa947953dd576e199428074f529da670174
                                • Opcode Fuzzy Hash: 4bc248c0fe6b3a31712a865ba503ed05e3d0c85f2ce24d990f49a0e85401b432
                                • Instruction Fuzzy Hash: 9291B571504305AFDB16EB50C891FABF3E8BF48310F004969F9599B291DB70EA94CF91
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __getptd_noexit
                                • String ID:
                                • API String ID: 3074181302-0
                                • Opcode ID: 56b392634465b8f891d884826c5a98789308724d5f6bd9568e13d5e9922096b1
                                • Instruction ID: d1c7b82a6e3d754ed0d193e2898b5cc2c2a4ebab9b989440cc97869ddb3e641f
                                • Opcode Fuzzy Hash: 56b392634465b8f891d884826c5a98789308724d5f6bd9568e13d5e9922096b1
                                • Instruction Fuzzy Hash: BD323974A04245DFDB2B8F68C840BED7BB5AF4E314F2A4569E8559F292D73098C2CB60

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 002F3F86
                                • RegisterClassExW.USER32(00000030), ref: 002F3FB0
                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 002F3FC1
                                • InitCommonControlsEx.COMCTL32(?), ref: 002F3FDE
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 002F3FEE
                                • LoadIconW.USER32(000000A9), ref: 002F4004
                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 002F4013
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                • API String ID: 2914291525-1005189915
                                • Opcode ID: 80e825a91f84252416887ab777ca69b199691ec3aef0c71968adccb0066bf7b5
                                • Instruction ID: e0d9071c98a3f4a67bbd9cf365c3aeba73a4e1e8bb352d305917af38281c1d2c
                                • Opcode Fuzzy Hash: 80e825a91f84252416887ab777ca69b199691ec3aef0c71968adccb0066bf7b5
                                • Instruction Fuzzy Hash: D921DBB5D00318AFDB12DFA4EC99BCDBBB8FB08704F50421AFA15A62A0D7B54584CF91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1073 33bfa4-33c054 call 31f8a0 call 30f4ea call 2f47b7 call 33bdb4 call 2f4517 call 3115e3 1086 33c107-33c10e call 33c56d 1073->1086 1087 33c05a-33c061 call 33c56d 1073->1087 1092 33c110-33c112 1086->1092 1093 33c117 1086->1093 1087->1092 1094 33c067-33c105 call 311dfc call 310d23 call 310cf4 call 311dfc call 310cf4 * 2 1087->1094 1095 33c367-33c368 1092->1095 1097 33c11a-33c1d6 call 2f44ed * 8 call 33c71a call 313499 1093->1097 1094->1097 1098 33c385-33c393 call 2f47e2 1095->1098 1132 33c1d8-33c1da 1097->1132 1133 33c1df-33c1fa call 33bdf8 1097->1133 1132->1095 1136 33c200-33c208 1133->1136 1137 33c28c-33c298 call 3135e4 1133->1137 1138 33c210 1136->1138 1139 33c20a-33c20e 1136->1139 1144 33c29a-33c2a9 DeleteFileW 1137->1144 1145 33c2ae-33c2b2 1137->1145 1141 33c215-33c233 call 2f44ed 1138->1141 1139->1141 1151 33c235-33c23b 1141->1151 1152 33c25d-33c273 call 33b791 call 312aae 1141->1152 1144->1095 1147 33c342-33c356 CopyFileW 1145->1147 1148 33c2b8-33c32f call 33c81d call 33c845 call 33b965 1145->1148 1149 33c36a-33c380 DeleteFileW call 33c6d9 1147->1149 1150 33c358-33c365 DeleteFileW 1147->1150 1148->1149 1169 33c331-33c340 DeleteFileW 1148->1169 1149->1098 1150->1095 1156 33c23d-33c250 call 33bf2e 1151->1156 1166 33c278-33c283 1152->1166 1164 33c252-33c25b 1156->1164 1164->1152 1166->1136 1168 33c289 1166->1168 1168->1137 1169->1095
                                APIs
                                  • Part of subcall function 0033BDB4: __time64.LIBCMT ref: 0033BDBE
                                  • Part of subcall function 002F4517: _fseek.LIBCMT ref: 002F452F
                                • __wsplitpath.LIBCMT ref: 0033C083
                                  • Part of subcall function 00311DFC: __wsplitpath_helper.LIBCMT ref: 00311E3C
                                • _wcscpy.LIBCMT ref: 0033C096
                                • _wcscat.LIBCMT ref: 0033C0A9
                                • __wsplitpath.LIBCMT ref: 0033C0CE
                                • _wcscat.LIBCMT ref: 0033C0E4
                                • _wcscat.LIBCMT ref: 0033C0F7
                                • _wcscmp.LIBCMT ref: 0033C03E
                                  • Part of subcall function 0033C56D: _wcscmp.LIBCMT ref: 0033C65D
                                  • Part of subcall function 0033C56D: _wcscmp.LIBCMT ref: 0033C670
                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0033C2A1
                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0033C338
                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0033C34E
                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0033C35F
                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0033C371
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                • String ID:
                                • API String ID: 2378138488-0
                                • Opcode ID: 4acf2711cb321192ccee1331586644cbf23c1affa9f4fe63b8af4edd57137903
                                • Instruction ID: f6118a809236f57c6e8250fc8c430ec6f5bdc764c3202a2d8c5e3a424fab7c3b
                                • Opcode Fuzzy Hash: 4acf2711cb321192ccee1331586644cbf23c1affa9f4fe63b8af4edd57137903
                                • Instruction Fuzzy Hash: 91C12AB1E10219ABDF26DF95CC81EEEB7BDAF49310F0040A6F609F6151DB709A948F61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1170 2f3742-2f3762 1172 2f3764-2f3767 1170->1172 1173 2f37c2-2f37c4 1170->1173 1175 2f3769-2f3770 1172->1175 1176 2f37c8 1172->1176 1173->1172 1174 2f37c6 1173->1174 1177 2f37ab-2f37b3 DefWindowProcW 1174->1177 1180 2f382c-2f3834 PostQuitMessage 1175->1180 1181 2f3776-2f377b 1175->1181 1178 2f37ce-2f37d1 1176->1178 1179 361e00-361e2e call 2f2ff6 call 30e312 1176->1179 1188 2f37b9-2f37bf 1177->1188 1182 2f37f6-2f381d SetTimer RegisterWindowMessageW 1178->1182 1183 2f37d3-2f37d4 1178->1183 1217 361e33-361e3a 1179->1217 1187 2f37f2-2f37f4 1180->1187 1185 361e88-361e9c call 334ddd 1181->1185 1186 2f3781-2f3783 1181->1186 1182->1187 1192 2f381f-2f382a CreatePopupMenu 1182->1192 1189 361da3-361da6 1183->1189 1190 2f37da-2f37ed KillTimer call 2f3847 call 2f390f 1183->1190 1185->1187 1211 361ea2 1185->1211 1193 2f3789-2f378e 1186->1193 1194 2f3836-2f3840 call 30eb83 1186->1194 1187->1188 1196 361ddc-361dfb MoveWindow 1189->1196 1197 361da8-361daa 1189->1197 1190->1187 1192->1187 1200 361e6d-361e74 1193->1200 1201 2f3794-2f3799 1193->1201 1212 2f3845 1194->1212 1196->1187 1204 361dac-361daf 1197->1204 1205 361dcb-361dd7 SetFocus 1197->1205 1200->1177 1207 361e7a-361e83 call 32a5f3 1200->1207 1209 2f379f-2f37a5 1201->1209 1210 361e58-361e68 call 3355bd 1201->1210 1204->1209 1213 361db5-361dc6 call 2f2ff6 1204->1213 1205->1187 1207->1177 1209->1177 1209->1217 1210->1187 1211->1177 1212->1187 1213->1187 1217->1177 1221 361e40-361e53 call 2f3847 call 2f4ffc 1217->1221 1221->1177
                                APIs
                                • DefWindowProcW.USER32(?,?,?,?), ref: 002F37B3
                                • KillTimer.USER32(?,00000001), ref: 002F37DD
                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 002F3800
                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 002F380B
                                • CreatePopupMenu.USER32 ref: 002F381F
                                • PostQuitMessage.USER32(00000000), ref: 002F382E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                • String ID: TaskbarCreated
                                • API String ID: 129472671-2362178303
                                • Opcode ID: 83bb0c6cc7f8e5d2f3517568301d145a2dfbc79126bb018e97f1a84e51477200
                                • Instruction ID: efaebb343a9fe296ae9b3e4ecf67609dee918e8464bfc2dd92fe25785b31926c
                                • Opcode Fuzzy Hash: 83bb0c6cc7f8e5d2f3517568301d145a2dfbc79126bb018e97f1a84e51477200
                                • Instruction Fuzzy Hash: 3D4127F513414EA7DB22FF28DC5ABBAB669FB00384F540235FB02D61A0CAA09D609761

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 002F3E79
                                • LoadCursorW.USER32(00000000,00007F00), ref: 002F3E88
                                • LoadIconW.USER32(00000063), ref: 002F3E9E
                                • LoadIconW.USER32(000000A4), ref: 002F3EB0
                                • LoadIconW.USER32(000000A2), ref: 002F3EC2
                                  • Part of subcall function 002F4024: LoadImageW.USER32(002F0000,00000063,00000001,00000010,00000010,00000000), ref: 002F4048
                                • RegisterClassExW.USER32(?), ref: 002F3F30
                                  • Part of subcall function 002F3F53: GetSysColorBrush.USER32(0000000F), ref: 002F3F86
                                  • Part of subcall function 002F3F53: RegisterClassExW.USER32(00000030), ref: 002F3FB0
                                  • Part of subcall function 002F3F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 002F3FC1
                                  • Part of subcall function 002F3F53: InitCommonControlsEx.COMCTL32(?), ref: 002F3FDE
                                  • Part of subcall function 002F3F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 002F3FEE
                                  • Part of subcall function 002F3F53: LoadIconW.USER32(000000A9), ref: 002F4004
                                  • Part of subcall function 002F3F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 002F4013
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                • String ID: #$0$AutoIt v3
                                • API String ID: 423443420-4155596026
                                • Opcode ID: 21ebc7b5ee1346a40f421eecca39a2daa95c3a0092865f380ad27275fed9f731
                                • Instruction ID: 89cf1c6f06e87542ceb275e227592e42b25b222ddea6e0bfd0260a9698403657
                                • Opcode Fuzzy Hash: 21ebc7b5ee1346a40f421eecca39a2daa95c3a0092865f380ad27275fed9f731
                                • Instruction Fuzzy Hash: 2D2165B0E04304ABCB56DFA9EC55A9ABFF9FB48318F50422AE704A32A0D77546508F91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1234 fc7648-fc76f6 call fc5088 1237 fc76fd-fc7723 call fc8558 CreateFileW 1234->1237 1240 fc772a-fc773a 1237->1240 1241 fc7725 1237->1241 1246 fc773c 1240->1246 1247 fc7741-fc775b VirtualAlloc 1240->1247 1242 fc7875-fc7879 1241->1242 1244 fc78bb-fc78be 1242->1244 1245 fc787b-fc787f 1242->1245 1248 fc78c1-fc78c8 1244->1248 1249 fc788b-fc788f 1245->1249 1250 fc7881-fc7884 1245->1250 1246->1242 1251 fc775d 1247->1251 1252 fc7762-fc7779 ReadFile 1247->1252 1253 fc791d-fc7932 1248->1253 1254 fc78ca-fc78d5 1248->1254 1255 fc789f-fc78a3 1249->1255 1256 fc7891-fc789b 1249->1256 1250->1249 1251->1242 1261 fc777b 1252->1261 1262 fc7780-fc77c0 VirtualAlloc 1252->1262 1257 fc7934-fc793f VirtualFree 1253->1257 1258 fc7942-fc794a 1253->1258 1263 fc78d9-fc78e5 1254->1263 1264 fc78d7 1254->1264 1259 fc78a5-fc78af 1255->1259 1260 fc78b3 1255->1260 1256->1255 1257->1258 1259->1260 1260->1244 1261->1242 1265 fc77c7-fc77e2 call fc87a8 1262->1265 1266 fc77c2 1262->1266 1267 fc78f9-fc7905 1263->1267 1268 fc78e7-fc78f7 1263->1268 1264->1253 1274 fc77ed-fc77f7 1265->1274 1266->1242 1271 fc7907-fc7910 1267->1271 1272 fc7912-fc7918 1267->1272 1270 fc791b 1268->1270 1270->1248 1271->1270 1272->1270 1275 fc77f9-fc7828 call fc87a8 1274->1275 1276 fc782a-fc783e call fc85b8 1274->1276 1275->1274 1282 fc7840 1276->1282 1283 fc7842-fc7846 1276->1283 1282->1242 1284 fc7848-fc784c CloseHandle 1283->1284 1285 fc7852-fc7856 1283->1285 1284->1285 1286 fc7858-fc7863 VirtualFree 1285->1286 1287 fc7866-fc786f 1285->1287 1286->1287 1287->1237 1287->1242
                                APIs
                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00FC7719
                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00FC793F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1286264706.0000000000FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FC5000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_fc5000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CreateFileFreeVirtual
                                • String ID:
                                • API String ID: 204039940-0
                                • Opcode ID: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                                • Instruction ID: a4e082ad365e173a0a9d6651ed5b7dec0e5fb2feca8f1627649e9909938c5d70
                                • Opcode Fuzzy Hash: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                                • Instruction Fuzzy Hash: DCA11770E0420AEBDB14DFA4C999FEEBBB5BF48314F208559E601BB280D7799A41DF50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1343 2f49fb-2f4a25 call 2fbcce RegOpenKeyExW 1346 2f4a2b-2f4a2f 1343->1346 1347 3641cc-3641e3 RegQueryValueExW 1343->1347 1348 364246-36424f RegCloseKey 1347->1348 1349 3641e5-364222 call 30f4ea call 2f47b7 RegQueryValueExW 1347->1349 1354 364224-36423b call 2f6a63 1349->1354 1355 36423d-364245 call 2f47e2 1349->1355 1354->1355 1355->1348
                                APIs
                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 002F4A1D
                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 003641DB
                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0036421A
                                • RegCloseKey.ADVAPI32(?), ref: 00364249
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: QueryValue$CloseOpen
                                • String ID: Include$Software\AutoIt v3\AutoIt
                                • API String ID: 1586453840-614718249
                                • Opcode ID: 5aa7c4228f1371dd928200581462aa278c85c416a8ff08eeb45df572388eabab
                                • Instruction ID: f6b93bb6d0e3927c334147d5c688687e5cf2ec8f8bbbb1f5d37d57259e288187
                                • Opcode Fuzzy Hash: 5aa7c4228f1371dd928200581462aa278c85c416a8ff08eeb45df572388eabab
                                • Instruction Fuzzy Hash: 73116D71A10208BEEB11ABA4DD96DFFBBBCEF04344F105069F506E6191EA70AE419B50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1370 2f36b8-2f3728 CreateWindowExW * 2 ShowWindow * 2
                                APIs
                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 002F36E6
                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 002F3707
                                • ShowWindow.USER32(00000000,?,?,?,?,002F3AA3,?), ref: 002F371B
                                • ShowWindow.USER32(00000000,?,?,?,?,002F3AA3,?), ref: 002F3724
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$CreateShow
                                • String ID: AutoIt v3$edit
                                • API String ID: 1584632944-3779509399
                                • Opcode ID: 009182554dbcda3aee82c8e8a453ce7dd807dc76647a83924a86b5ef30df8dcb
                                • Instruction ID: 9aa10106f9843c1d3ff1c433f634d6ead55997bf3cd798fcffa44a50038be3ea
                                • Opcode Fuzzy Hash: 009182554dbcda3aee82c8e8a453ce7dd807dc76647a83924a86b5ef30df8dcb
                                • Instruction Fuzzy Hash: 19F03A719442D87AE7326B57AC18E672E7DD7C6F28F60011ABB08A21A0C1650881CAB0

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 002F5374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,003B1148,?,002F61FF,?,00000000,00000001,00000000), ref: 002F5392
                                  • Part of subcall function 002F49FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 002F4A1D
                                • _wcscat.LIBCMT ref: 00362D80
                                • _wcscat.LIBCMT ref: 00362DB5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _wcscat$FileModuleNameOpen
                                • String ID: 8!;$\$\Include\
                                • API String ID: 3592542968-2314511254
                                • Opcode ID: 865536e9402aaebb0810f3be978873b30abda0937a64d95ac76fda1b2ff92742
                                • Instruction ID: bf408e992c3de1505e1ef3f83fa5294c692d5c929a35e90d5e32f00fdbdaf53b
                                • Opcode Fuzzy Hash: 865536e9402aaebb0810f3be978873b30abda0937a64d95ac76fda1b2ff92742
                                • Instruction Fuzzy Hash: 50516C754143449B8316EF59E9818ABB3FCFE59348F404B2EF748972A1EB709A48CF52

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1528 fc7438-fc7540 call fc5088 call fc7328 CreateFileW 1535 fc7547-fc7557 1528->1535 1536 fc7542 1528->1536 1539 fc755e-fc7578 VirtualAlloc 1535->1539 1540 fc7559 1535->1540 1537 fc75f7-fc75fc 1536->1537 1541 fc757c-fc7593 ReadFile 1539->1541 1542 fc757a 1539->1542 1540->1537 1543 fc7595 1541->1543 1544 fc7597-fc75d1 call fc7368 call fc6328 1541->1544 1542->1537 1543->1537 1549 fc75ed-fc75f5 ExitProcess 1544->1549 1550 fc75d3-fc75e8 call fc73b8 1544->1550 1549->1537 1550->1549
                                APIs
                                  • Part of subcall function 00FC7328: Sleep.KERNELBASE(000001F4), ref: 00FC7339
                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00FC7536
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1286264706.0000000000FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FC5000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_fc5000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CreateFileSleep
                                • String ID: 1OJZXXET4VLURT
                                • API String ID: 2694422964-2683484256
                                • Opcode ID: 031153a8c0129c35037bc539414f266fd117724c07baee56cd80a98b87b3c9eb
                                • Instruction ID: 27295ecac36eb7363dad22071aad3542bbd64a762eb9f25fbc3553e3722e05b0
                                • Opcode Fuzzy Hash: 031153a8c0129c35037bc539414f266fd117724c07baee56cd80a98b87b3c9eb
                                • Instruction Fuzzy Hash: 80517071D0434ADAEF10EBA4C909BEEBB74AF09300F144599E648BB2C0DB791A49DB65
                                APIs
                                • _memset.LIBCMT ref: 002F522F
                                • _wcscpy.LIBCMT ref: 002F5283
                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 002F5293
                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00363CB0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                • String ID: Line:
                                • API String ID: 1053898822-1585850449
                                • Opcode ID: e06bb6722ec326e31b4e102a745e0eb917a17b32465ac0a0d87fa0324577c4df
                                • Instruction ID: 6c90048e6606b2c2287a2b058cf03e43755ac45f4d9f1457f0cd51e7259773d5
                                • Opcode Fuzzy Hash: e06bb6722ec326e31b4e102a745e0eb917a17b32465ac0a0d87fa0324577c4df
                                • Instruction Fuzzy Hash: 3731E4310183586FD322EB50DC46FEBB7DCAF44384F00462EF78992091DBB0A668CB92
                                APIs
                                  • Part of subcall function 002F41A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,002F39FE,?,00000001), ref: 002F41DB
                                • _free.LIBCMT ref: 003636B7
                                • _free.LIBCMT ref: 003636FE
                                  • Part of subcall function 002FC833: __wsplitpath.LIBCMT ref: 002FC93E
                                  • Part of subcall function 002FC833: _wcscpy.LIBCMT ref: 002FC953
                                  • Part of subcall function 002FC833: _wcscat.LIBCMT ref: 002FC968
                                  • Part of subcall function 002FC833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 002FC978
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                • API String ID: 805182592-1757145024
                                • Opcode ID: 05f49cb2b37fa2d6bff039149e0eb028f78f9b524064e1c663d949817d36bb46
                                • Instruction ID: f97b51f7b30b57323fea79212ee91a7107b57d50409d1b466deb9ec4fb69f57e
                                • Opcode Fuzzy Hash: 05f49cb2b37fa2d6bff039149e0eb028f78f9b524064e1c663d949817d36bb46
                                • Instruction Fuzzy Hash: 03915B71910219AFCF06EFA4CC919FEB7B4BF09350F10842AF916AB295DB749A54CF90
                                APIs
                                • _memset.LIBCMT ref: 00363725
                                • GetOpenFileNameW.COMDLG32 ref: 0036376F
                                  • Part of subcall function 002F660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002F53B1,?,?,002F61FF,?,00000000,00000001,00000000), ref: 002F662F
                                  • Part of subcall function 002F40A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 002F40C6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Name$Path$FileFullLongOpen_memset
                                • String ID: X$t3:
                                • API String ID: 3777226403-2156803952
                                • Opcode ID: d9e3cae19948bdf3928a973f2245aa9070fd2a6163b25cf9dfdd31463882be4e
                                • Instruction ID: 6271b19445ea538a85b9d8a91dda9373eb25ca7af6e1c628cff72d1e236244bc
                                • Opcode Fuzzy Hash: d9e3cae19948bdf3928a973f2245aa9070fd2a6163b25cf9dfdd31463882be4e
                                • Instruction Fuzzy Hash: 0A219671A1015CABCF16EFD8D8457EFBBF89F49304F004069E509A7241DBF45A898F65
                                APIs
                                • __getstream.LIBCMT ref: 003134FE
                                  • Part of subcall function 00317C0E: __getptd_noexit.LIBCMT ref: 00317C0E
                                • @_EH4_CallFilterFunc@8.LIBCMT ref: 00313539
                                • __wopenfile.LIBCMT ref: 00313549
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                • String ID: <G
                                • API String ID: 1820251861-2138716496
                                • Opcode ID: 3084ce869c00be53feb36bbf0acf4a8e284af1b9ab563b7d1c8a559cc39434ff
                                • Instruction ID: 1ed54dbc44d61a0ebcb91da0b6dc8673b5dd2941510b73b84324b32530d0f439
                                • Opcode Fuzzy Hash: 3084ce869c00be53feb36bbf0acf4a8e284af1b9ab563b7d1c8a559cc39434ff
                                • Instruction Fuzzy Hash: 4E113A70A002069BDB1BBFB18C026EE76B5AF0E750B158425E814DF181EF30CAC197B1
                                APIs
                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,0030D28B,SwapMouseButtons,00000004,?), ref: 0030D2BC
                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,0030D28B,SwapMouseButtons,00000004,?,?,?,?,0030C865), ref: 0030D2DD
                                • RegCloseKey.KERNELBASE(00000000,?,?,0030D28B,SwapMouseButtons,00000004,?,?,?,?,0030C865), ref: 0030D2FF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID: Control Panel\Mouse
                                • API String ID: 3677997916-824357125
                                • Opcode ID: d45ab254f5a5eea85e3a8644b95748baa03a0f78e2c871644730c6d512c459b3
                                • Instruction ID: b798ffcf4c3047aeaecd1187e9dab8e412daa1547c6960fe9270b1308370cca1
                                • Opcode Fuzzy Hash: d45ab254f5a5eea85e3a8644b95748baa03a0f78e2c871644730c6d512c459b3
                                • Instruction Fuzzy Hash: 2E113979612208BFDB228FA8DC94EAF7BFCEF44744F104869E805D7150E731AE419B60
                                APIs
                                • CreateProcessW.KERNELBASE(?,00000000), ref: 00FC6B55
                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00FC6B79
                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00FC6B9B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1286264706.0000000000FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FC5000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_fc5000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                • String ID:
                                • API String ID: 2438371351-0
                                • Opcode ID: fc310a6135c3389c0587bc6629e9838c2c50d5be0bfc8bfa2df8a04cac11b1e3
                                • Instruction ID: d9dc948a2f1be08bae6607d42daf96147da6b419cdc64642dd27dcbd4d9e2c1f
                                • Opcode Fuzzy Hash: fc310a6135c3389c0587bc6629e9838c2c50d5be0bfc8bfa2df8a04cac11b1e3
                                • Instruction Fuzzy Hash: 03620C34A182199BEB24CFA4C941BDEB376EF58300F1091ADD10DEB390E7799E81DB59
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                • String ID:
                                • API String ID: 3877424927-0
                                • Opcode ID: 25276d1f646da7b76298e578b8e053e7e3b96e54df01e447abe6ae266d0f960a
                                • Instruction ID: f63a8837a0a0ab88fc4d1c587c3bc9243278f1b3b8f1083ca6e7fa4a96894418
                                • Opcode Fuzzy Hash: 25276d1f646da7b76298e578b8e053e7e3b96e54df01e447abe6ae266d0f960a
                                • Instruction Fuzzy Hash: 0551A7B0A00305EBDB2E8F6988855EEB7B5AF48320F258729F835966D0D7719FD48B50
                                APIs
                                  • Part of subcall function 002F4517: _fseek.LIBCMT ref: 002F452F
                                  • Part of subcall function 0033C56D: _wcscmp.LIBCMT ref: 0033C65D
                                  • Part of subcall function 0033C56D: _wcscmp.LIBCMT ref: 0033C670
                                • _free.LIBCMT ref: 0033C4DD
                                • _free.LIBCMT ref: 0033C4E4
                                • _free.LIBCMT ref: 0033C54F
                                  • Part of subcall function 00311C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00317A85), ref: 00311CB1
                                  • Part of subcall function 00311C9D: GetLastError.KERNEL32(00000000,?,00317A85), ref: 00311CC3
                                • _free.LIBCMT ref: 0033C557
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                • String ID:
                                • API String ID: 1552873950-0
                                • Opcode ID: acbc9bddfc27afc87d88584c9959c104a0ea567534d53ec5d359cc2505f852cb
                                • Instruction ID: cc33015f1b40223ccbffe50b0f1b1ec9b6e87948644a7185e0bb44091029d8d6
                                • Opcode Fuzzy Hash: acbc9bddfc27afc87d88584c9959c104a0ea567534d53ec5d359cc2505f852cb
                                • Instruction Fuzzy Hash: 68514CB1914218AFDF259F65DC81BEEBBB9EF48300F1000AEF259B7241DB715A908F59
                                APIs
                                • _memset.LIBCMT ref: 0030EBB2
                                  • Part of subcall function 002F51AF: _memset.LIBCMT ref: 002F522F
                                  • Part of subcall function 002F51AF: _wcscpy.LIBCMT ref: 002F5283
                                  • Part of subcall function 002F51AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 002F5293
                                • KillTimer.USER32(?,00000001,?,?), ref: 0030EC07
                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0030EC16
                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00363C88
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                • String ID:
                                • API String ID: 1378193009-0
                                • Opcode ID: d545e5f325c810dd8e01f655444335ef6e476d859d71f02caf67bc56273ea540
                                • Instruction ID: c46b9e022b33b12eb97b0ffca32aacc320dc1bdba9cf0c0451aee99d2b15a601
                                • Opcode Fuzzy Hash: d545e5f325c810dd8e01f655444335ef6e476d859d71f02caf67bc56273ea540
                                • Instruction Fuzzy Hash: 0C21C5705047949FE733DB288869BE7BBFC9B45308F05048DE68E66185C3756A848B51
                                APIs
                                • GetTempPathW.KERNEL32(00000104,?), ref: 0033C72F
                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0033C746
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Temp$FileNamePath
                                • String ID: aut
                                • API String ID: 3285503233-3010740371
                                • Opcode ID: 087a9282af0afd8888491f43ed0dcbe9f50c7e6ead3e4130b56caa1e5bf1d4ab
                                • Instruction ID: 10af0742ae07b7aee57464ace5b0858a927985cba092be8da59b11c9a1318280
                                • Opcode Fuzzy Hash: 087a9282af0afd8888491f43ed0dcbe9f50c7e6ead3e4130b56caa1e5bf1d4ab
                                • Instruction Fuzzy Hash: 33D05E7154030EABDB61AB90DC0EFCAB77C9B04704F0005A0B654A50B2DBB0E6DA8B54
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 42533045a199ecf502ed6efac3982ce93d6ab769971c6a32c2811da70f337644
                                • Instruction ID: 66e7d7d51f2bb3975fce625c23965cc687778cb3110856c89ba52ada6560aa34
                                • Opcode Fuzzy Hash: 42533045a199ecf502ed6efac3982ce93d6ab769971c6a32c2811da70f337644
                                • Instruction Fuzzy Hash: F0F16971A083019FC711DF28C895B6AB7E5FF89314F14892EF9999B292D730E945CF82
                                APIs
                                • _memset.LIBCMT ref: 002F5022
                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 002F50CB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: IconNotifyShell__memset
                                • String ID:
                                • API String ID: 928536360-0
                                • Opcode ID: 9aec02e779299d8607b610d8608e7abd8324a31473e0fd21744daddca7167330
                                • Instruction ID: c5e4a723df8b0d12786fba92b0435e7d4a5a9317b4137d1b5d767ae717265799
                                • Opcode Fuzzy Hash: 9aec02e779299d8607b610d8608e7abd8324a31473e0fd21744daddca7167330
                                • Instruction Fuzzy Hash: E73180B1614715DFC722EF24D8456A7BBE8FF48348F00092EF79A86241EB716954CB92
                                APIs
                                • __FF_MSGBANNER.LIBCMT ref: 00313973
                                  • Part of subcall function 003181C2: __NMSG_WRITE.LIBCMT ref: 003181E9
                                  • Part of subcall function 003181C2: __NMSG_WRITE.LIBCMT ref: 003181F3
                                • __NMSG_WRITE.LIBCMT ref: 0031397A
                                  • Part of subcall function 0031821F: GetModuleFileNameW.KERNEL32(00000000,003B0312,00000104,00000000,00000001,00000000), ref: 003182B1
                                  • Part of subcall function 0031821F: ___crtMessageBoxW.LIBCMT ref: 0031835F
                                  • Part of subcall function 00311145: ___crtCorExitProcess.LIBCMT ref: 0031114B
                                  • Part of subcall function 00311145: ExitProcess.KERNEL32 ref: 00311154
                                  • Part of subcall function 00317C0E: __getptd_noexit.LIBCMT ref: 00317C0E
                                • RtlAllocateHeap.NTDLL(00DC0000,00000000,00000001,00000001,00000000,?,?,0030F507,?,0000000E), ref: 0031399F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                • String ID:
                                • API String ID: 1372826849-0
                                • Opcode ID: 066b4d1ccacb255bb3497c1060535597d76fafa6bec8f5bb8246c9807a24e742
                                • Instruction ID: a4bef5456f72985278d355dcffb292b57ab449284d61b162568554e2614af532
                                • Opcode Fuzzy Hash: 066b4d1ccacb255bb3497c1060535597d76fafa6bec8f5bb8246c9807a24e742
                                • Instruction Fuzzy Hash: D9019236245211AAE62F3B35DC42BEA335C9B8D764F620125F6059F592DFB4DEC086A0
                                APIs
                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,0033C385,?,?,?,?,?,00000004), ref: 0033C6F2
                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,0033C385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 0033C708
                                • CloseHandle.KERNEL32(00000000,?,0033C385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0033C70F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: File$CloseCreateHandleTime
                                • String ID:
                                • API String ID: 3397143404-0
                                • Opcode ID: c7e3ea11f069446003fda289127ffd2f8cadfb0a0524d9cca4112fc06772c373
                                • Instruction ID: 4bee8c450732729b3e3299bf88cd1a7fa5bc091d0d586915624ca7d1cf47f7db
                                • Opcode Fuzzy Hash: c7e3ea11f069446003fda289127ffd2f8cadfb0a0524d9cca4112fc06772c373
                                • Instruction Fuzzy Hash: 82E08632140214BBE7322B54AC0AFCA7B6DAF05761F104110FB58790E097B125518798
                                APIs
                                • _free.LIBCMT ref: 0033BB72
                                  • Part of subcall function 00311C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00317A85), ref: 00311CB1
                                  • Part of subcall function 00311C9D: GetLastError.KERNEL32(00000000,?,00317A85), ref: 00311CC3
                                • _free.LIBCMT ref: 0033BB83
                                • _free.LIBCMT ref: 0033BB95
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 8d6c99314b0704041c66cbc9d98ad607d1a0ae96d99a55b8255782f8bd4ba31d
                                • Instruction ID: 9ff8b581f833f4ef6ff964442d1dced6ba4dd428167dee8a98f123ed38681bbc
                                • Opcode Fuzzy Hash: 8d6c99314b0704041c66cbc9d98ad607d1a0ae96d99a55b8255782f8bd4ba31d
                                • Instruction Fuzzy Hash: 12E05BA174174147DA3965796E85EF7E3CC4F08351F15081DB759EB146CF24F88085F4
                                APIs
                                  • Part of subcall function 002F22A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,002F24F1), ref: 002F2303
                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 002F25A1
                                • CoInitialize.OLE32(00000000), ref: 002F2618
                                • CloseHandle.KERNEL32(00000000), ref: 0036503A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Handle$CloseInitializeMessageRegisterWindow
                                • String ID:
                                • API String ID: 3815369404-0
                                • Opcode ID: 08dac4327a64b56d730f0625fec3f821c21ff412eed00e1f56839e1fd529d101
                                • Instruction ID: 9cae3b91fd21a6cb3ddaebee8f7809ad9154c7ca7962b920837f30dadd36bd68
                                • Opcode Fuzzy Hash: 08dac4327a64b56d730f0625fec3f821c21ff412eed00e1f56839e1fd529d101
                                • Instruction Fuzzy Hash: 2671CCB89112458A8717EF6AA8B4595BBECFB9934CBE04B2ED309CB7B1DB304414CF54
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __fread_nolock
                                • String ID: EA06
                                • API String ID: 2638373210-3962188686
                                • Opcode ID: e25fedf7a4e61426d1aa7f9d83e71fb08bad40bf467d59893a9a0e51e11b91cd
                                • Instruction ID: dd83e38c0903dd9b095353cedeb84043ccecd92b6e47eacdae4fa513ca747667
                                • Opcode Fuzzy Hash: e25fedf7a4e61426d1aa7f9d83e71fb08bad40bf467d59893a9a0e51e11b91cd
                                • Instruction Fuzzy Hash: 5301B1729042187EDB29C7A8CC56FEEBBFC9B15301F00459AF596D6581E9B8E7088B60
                                APIs
                                • _strcat.LIBCMT ref: 003508FD
                                  • Part of subcall function 002F936C: __swprintf.LIBCMT ref: 002F93AB
                                  • Part of subcall function 002F936C: __itow.LIBCMT ref: 002F93DF
                                • _wcscpy.LIBCMT ref: 0035098C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __itow__swprintf_strcat_wcscpy
                                • String ID:
                                • API String ID: 1012013722-0
                                • Opcode ID: c87bc9172d307c6fd623c9b8214e6d1b304f60af8fae97e2a9317af251409b42
                                • Instruction ID: 38d440206661ea414a260415dbee6bad082482f65bbf29a662792dd6783f5b44
                                • Opcode Fuzzy Hash: c87bc9172d307c6fd623c9b8214e6d1b304f60af8fae97e2a9317af251409b42
                                • Instruction Fuzzy Hash: B8913534A00604DFCB19DF28C491DA9B7E5EF49311B5580AAEC5A8F7A2DB31ED55CF80
                                APIs
                                • IsThemeActive.UXTHEME ref: 002F3A73
                                  • Part of subcall function 00311405: __lock.LIBCMT ref: 0031140B
                                  • Part of subcall function 002F3ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 002F3AF3
                                  • Part of subcall function 002F3ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 002F3B08
                                  • Part of subcall function 002F3D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,002F3AA3,?), ref: 002F3D45
                                  • Part of subcall function 002F3D19: IsDebuggerPresent.KERNEL32(?,?,?,?,002F3AA3,?), ref: 002F3D57
                                  • Part of subcall function 002F3D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,003B1148,003B1130,?,?,?,?,002F3AA3,?), ref: 002F3DC8
                                  • Part of subcall function 002F3D19: SetCurrentDirectoryW.KERNEL32(?,?,?,002F3AA3,?), ref: 002F3E48
                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 002F3AB3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
                                • String ID:
                                • API String ID: 924797094-0
                                • Opcode ID: a6d1e07af7089b979aa780024fa2bd8373da418e412f8f228b9d7c277af379a9
                                • Instruction ID: e77cb7e54332861a28fbeb8c13fdcdea7b99f35a3a301c19a870011c187a7326
                                • Opcode Fuzzy Hash: a6d1e07af7089b979aa780024fa2bd8373da418e412f8f228b9d7c277af379a9
                                • Instruction Fuzzy Hash: 7911AC719083409BC302EF2AEC4595BFBF8EF94758F008A1EF685872B1DB709595CB92
                                APIs
                                • ___lock_fhandle.LIBCMT ref: 0031EA29
                                • __close_nolock.LIBCMT ref: 0031EA42
                                  • Part of subcall function 00317BDA: __getptd_noexit.LIBCMT ref: 00317BDA
                                  • Part of subcall function 00317C0E: __getptd_noexit.LIBCMT ref: 00317C0E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                • String ID:
                                • API String ID: 1046115767-0
                                • Opcode ID: 7003233371d91073293cdc6da2debce52f6d1bf307200ebcc5d933e5cb153561
                                • Instruction ID: 41fe7e3da9a455d2513b86af8875f0245a34712317c1bc696c579a643171d8fc
                                • Opcode Fuzzy Hash: 7003233371d91073293cdc6da2debce52f6d1bf307200ebcc5d933e5cb153561
                                • Instruction Fuzzy Hash: AC11A9729096108ED71FBF68C8427DD7A616F8D335F1A4340E9215F1E2C7B58DC0DAA1
                                APIs
                                  • Part of subcall function 0031395C: __FF_MSGBANNER.LIBCMT ref: 00313973
                                  • Part of subcall function 0031395C: __NMSG_WRITE.LIBCMT ref: 0031397A
                                  • Part of subcall function 0031395C: RtlAllocateHeap.NTDLL(00DC0000,00000000,00000001,00000001,00000000,?,?,0030F507,?,0000000E), ref: 0031399F
                                • std::exception::exception.LIBCMT ref: 0030F51E
                                • __CxxThrowException@8.LIBCMT ref: 0030F533
                                  • Part of subcall function 00316805: RaiseException.KERNEL32(?,?,0000000E,003A6A30,?,?,?,0030F538,0000000E,003A6A30,?,00000001), ref: 00316856
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                • String ID:
                                • API String ID: 3902256705-0
                                • Opcode ID: 579886d11c116d4e910d2af440a04133fe3bc19a8253dca51c37ef4604be6e26
                                • Instruction ID: 5a95a58689d968e6417d3eb55f9015459a74f842c210856f9adb312ef1d344c5
                                • Opcode Fuzzy Hash: 579886d11c116d4e910d2af440a04133fe3bc19a8253dca51c37ef4604be6e26
                                • Instruction Fuzzy Hash: 87F0283110021D6BCB2BBFA8DC229EE77ACAF05314F608035F908E64C1CFB0D78482A5
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __lock_file_memset
                                • String ID:
                                • API String ID: 26237723-0
                                • Opcode ID: cb3ed05017143ddeffcd297d928cf15330467158d87339b493b60461910752a7
                                • Instruction ID: eec6c9381da98ce56a6c6b07042201ccdbd2fff5196d22afd4e170128bbca544
                                • Opcode Fuzzy Hash: cb3ed05017143ddeffcd297d928cf15330467158d87339b493b60461910752a7
                                • Instruction Fuzzy Hash: 6C018471800209ABCF2BAFA58C024DE7F71EF48320F158259F8245B161D7718BE6DF91
                                APIs
                                  • Part of subcall function 00317C0E: __getptd_noexit.LIBCMT ref: 00317C0E
                                • __lock_file.LIBCMT ref: 00313629
                                  • Part of subcall function 00314E1C: __lock.LIBCMT ref: 00314E3F
                                • __fclose_nolock.LIBCMT ref: 00313634
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                • String ID:
                                • API String ID: 2800547568-0
                                • Opcode ID: 5cb268ce9bad39ee8e9919504ed6ed5a12d928bcab07b7db2ec3f0bc18c3bc4f
                                • Instruction ID: a8abbc15b726ae698ec9a7558b13bbf61be4d3fea44a812c1492d394f4d33a86
                                • Opcode Fuzzy Hash: 5cb268ce9bad39ee8e9919504ed6ed5a12d928bcab07b7db2ec3f0bc18c3bc4f
                                • Instruction Fuzzy Hash: A7F0BB71905604AAD71B7B6588437DEBAA05F49730F258208E460AF2C1C77C86C19F65
                                APIs
                                • CreateProcessW.KERNELBASE(?,00000000), ref: 00FC6B55
                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00FC6B79
                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00FC6B9B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1286264706.0000000000FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FC5000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_fc5000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                • String ID:
                                • API String ID: 2438371351-0
                                • Opcode ID: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                                • Instruction ID: 964a286c0b7b8f744c396a5dce04c839a0d98c2ba7788d4d40546d70b021f691
                                • Opcode Fuzzy Hash: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                                • Instruction Fuzzy Hash: 7912DF24E18658C6EB24DF64D8517DEB232EF68300F1090ED910DEB7A5E77A4E81CF5A
                                APIs
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002FE959
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessagePeek
                                • String ID:
                                • API String ID: 2222842502-0
                                • Opcode ID: 4e61f1ac9ca9ce2b202778fd0b3b8bedc0d30de4525f54711859b904e2860296
                                • Instruction ID: 165ad0762fe189c27f8cdbb755e9a558560edb7e674dc420ad885af00c38df36
                                • Opcode Fuzzy Hash: 4e61f1ac9ca9ce2b202778fd0b3b8bedc0d30de4525f54711859b904e2860296
                                • Instruction Fuzzy Hash: C17118708093858FEF37CF24C89476ABBD4BB15348F094A7EDA858F2A5D3759885CB42
                                APIs
                                • __flush.LIBCMT ref: 00312A0B
                                  • Part of subcall function 00317C0E: __getptd_noexit.LIBCMT ref: 00317C0E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __flush__getptd_noexit
                                • String ID:
                                • API String ID: 4101623367-0
                                • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                • Instruction ID: 6932419454a47ba55e860703015e9538c5c49f1509deccd7653af19c39028f74
                                • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                • Instruction Fuzzy Hash: 574174717007069FDF2E8E69C8815EF77A6AF4C360B25852DE855CB240EB70DDE18B94
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                • Instruction ID: 6a2d7f381c84591c27690b6b4b3824731fba8ce612274dd073da190c60ac5717
                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                • Instruction Fuzzy Hash: C831E971B02106DFC71ADF58C4A0969FBB6FF49340B658AA5E409CB695DB30EDC1CB80
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: 1ecde4fcd00426e4edf754c3fe6a250616c74c38f66fc5e2e0b3fa79503c3d8e
                                • Instruction ID: 6a14a2adbb63092816f85af76052ef0e9aff291ea91077d7acac3eba25f37690
                                • Opcode Fuzzy Hash: 1ecde4fcd00426e4edf754c3fe6a250616c74c38f66fc5e2e0b3fa79503c3d8e
                                • Instruction Fuzzy Hash: 1F31C275104528CFCB06EF10C095A6E77B4FF49321F20884AEE951F3A6E771A909CF81
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ClearVariant
                                • String ID:
                                • API String ID: 1473721057-0
                                • Opcode ID: 1e7fbe2a2fbd58962e3d51b1566f2d7a8c7b6efae0c36cacd83b862151f9f179
                                • Instruction ID: 031a26e26a056477483978a3ff744ee6d9b9d227c81dc622fd592244be6acc2c
                                • Opcode Fuzzy Hash: 1e7fbe2a2fbd58962e3d51b1566f2d7a8c7b6efae0c36cacd83b862151f9f179
                                • Instruction Fuzzy Hash: 15415D705056018FDB26DF18C494B1ABBF0BF45304F1989ACE99A4B7A2C372F885CF52
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __getptd_noexit
                                • String ID:
                                • API String ID: 3074181302-0
                                • Opcode ID: 45a039f0acd80672279cd3e2a54d3d2b4d826c4a842b1b680a7167d45c32c697
                                • Instruction ID: e989e61df6dc55dceb12035acc10a0f391b7c5c4c0b943f63552ee426f48d7bd
                                • Opcode Fuzzy Hash: 45a039f0acd80672279cd3e2a54d3d2b4d826c4a842b1b680a7167d45c32c697
                                • Instruction Fuzzy Hash: 68216F729096408FD71B7FA8DC467D93A615F4A336F2A4740E8204F1E2DB7589908BA1
                                APIs
                                  • Part of subcall function 002F4214: FreeLibrary.KERNEL32(00000000,?), ref: 002F4247
                                • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,002F39FE,?,00000001), ref: 002F41DB
                                  • Part of subcall function 002F4291: FreeLibrary.KERNEL32(00000000), ref: 002F42C4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Library$Free$Load
                                • String ID:
                                • API String ID: 2391024519-0
                                • Opcode ID: e009796b9e9efb88941e12d5a3cdabbee290b9b9d51352fa29177cd9a3a63b6a
                                • Instruction ID: 744cbcbd4f70810b175db2102cea6600adb813546c7b7de1866aa8e3add4442f
                                • Opcode Fuzzy Hash: e009796b9e9efb88941e12d5a3cdabbee290b9b9d51352fa29177cd9a3a63b6a
                                • Instruction Fuzzy Hash: 1B11C831620209AADB11BB64DC16FAFB7A59F40740F108439FA56AA1C5DBF49A509F50
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ClearVariant
                                • String ID:
                                • API String ID: 1473721057-0
                                • Opcode ID: 4f70593c10e37c05cade7d448e0acbd04590b62c82168336f4f9f417f9165485
                                • Instruction ID: 555a6201c422633c91fd56595f2ac3d92f492f749a06b1cb099458e3a6d0470f
                                • Opcode Fuzzy Hash: 4f70593c10e37c05cade7d448e0acbd04590b62c82168336f4f9f417f9165485
                                • Instruction Fuzzy Hash: 6D215770509701CFDB26DF68C464B2ABBF1BF85304F15496CE69A4B6A2C732E845CF52
                                APIs
                                • ___lock_fhandle.LIBCMT ref: 0031AFC0
                                  • Part of subcall function 00317BDA: __getptd_noexit.LIBCMT ref: 00317BDA
                                  • Part of subcall function 00317C0E: __getptd_noexit.LIBCMT ref: 00317C0E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __getptd_noexit$___lock_fhandle
                                • String ID:
                                • API String ID: 1144279405-0
                                • Opcode ID: 4c96b4df57c51e0e909d6e42da56acb28980f0ce312ac4b7b376b7004b3f0590
                                • Instruction ID: de40f742ca4e7b9c6d2b704d9aeecba1e2d11ff2657c797e781eb21cfd345115
                                • Opcode Fuzzy Hash: 4c96b4df57c51e0e909d6e42da56acb28980f0ce312ac4b7b376b7004b3f0590
                                • Instruction Fuzzy Hash: 20116D728096009FD71B6FA4C8427DABA60AF8D336F1A4340E4745F1E2C7B489C08BA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: e908df7db2011151d19b897d4a4948494f90a1a3426dd436a38c65c5f4b6a17e
                                • Instruction ID: a6c25c2997820c8f371356e5f9e8ac881b12220c8c91672b27052be2335e4027
                                • Opcode Fuzzy Hash: e908df7db2011151d19b897d4a4948494f90a1a3426dd436a38c65c5f4b6a17e
                                • Instruction Fuzzy Hash: 5301817151010DAECF05EFA4C8928FFFB74AF24344F00C03ABA26971A5EA709A59CF60
                                APIs
                                • __lock_file.LIBCMT ref: 00312AED
                                  • Part of subcall function 00317C0E: __getptd_noexit.LIBCMT ref: 00317C0E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __getptd_noexit__lock_file
                                • String ID:
                                • API String ID: 2597487223-0
                                • Opcode ID: cacd0098af1e6cdbc9e51dd135b91fd3e30fca9130251cbc6611c00df040c5ef
                                • Instruction ID: dee157fcee4b4a8bb2103126b7d3bbf53b04008ad6d8ef0a03078f9b7d341db8
                                • Opcode Fuzzy Hash: cacd0098af1e6cdbc9e51dd135b91fd3e30fca9130251cbc6611c00df040c5ef
                                • Instruction Fuzzy Hash: B0F06D31900205AADF2FAFB98C067DF7AA5BF08320F198515F4149E191DB788AF2DB91
                                APIs
                                • FreeLibrary.KERNEL32(?,?,?,?,?,002F39FE,?,00000001), ref: 002F4286
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: FreeLibrary
                                • String ID:
                                • API String ID: 3664257935-0
                                • Opcode ID: b025484d20b33510c97f649461b339a37139ea3495ab26a5b7748fc7444d7f53
                                • Instruction ID: 4fc5fd4ec0b8f07b97f86c6acc064af1315263ec1ea5964427ccc6f2b636db78
                                • Opcode Fuzzy Hash: b025484d20b33510c97f649461b339a37139ea3495ab26a5b7748fc7444d7f53
                                • Instruction Fuzzy Hash: 19F01C71525706CFCB35AF64D490827FBE5BF043653248A3EF6D682610C7B19890DF50
                                APIs
                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 002F40C6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: LongNamePath
                                • String ID:
                                • API String ID: 82841172-0
                                • Opcode ID: 3381ad4ae02c583c3de844aea28c5cde206ef90d78034986c7e863036f1a3930
                                • Instruction ID: b4075ce160ffbe6ff373c2c231aa3fae778fa6444bae947e4c365dc5638ca340
                                • Opcode Fuzzy Hash: 3381ad4ae02c583c3de844aea28c5cde206ef90d78034986c7e863036f1a3930
                                • Instruction Fuzzy Hash: 0BE0CD365001245BC7129654CC46FFA77ADDF8C790F050175F909E7244D97499C18A90
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __fread_nolock
                                • String ID:
                                • API String ID: 2638373210-0
                                • Opcode ID: 3cca4198d2bc13ecada8dba30311a83a0df564d107d747b73ddd6f796e1577fd
                                • Instruction ID: cf91d9cadac147799c265e4d8d243dc450e32d20800116af99e32bc0de0b88d4
                                • Opcode Fuzzy Hash: 3cca4198d2bc13ecada8dba30311a83a0df564d107d747b73ddd6f796e1577fd
                                • Instruction Fuzzy Hash: 9EE092B0104B009FD7398F24D840BE3B3E0EB09305F00081CF29A87241EB6278458659
                                APIs
                                • Sleep.KERNELBASE(000001F4), ref: 00FC7339
                                Memory Dump Source
                                • Source File: 00000000.00000002.1286264706.0000000000FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FC5000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_fc5000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                • Instruction ID: 45f9b6c94a2403faccb1b322d351b6848a58fb577339e7c3bc553cfeecc2d05b
                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                • Instruction Fuzzy Hash: 1DE0E67594424EDFDB00EFB4D64969D7BB4EF04301F1001A5FD01D2280D6309D509A62
                                APIs
                                • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0035B1CD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: %d/%02d/%02d
                                • API String ID: 3850602802-328681919
                                • Opcode ID: 2f63c4127990fa7547976ccd6fbab82afe84e060df516028f55638f90560a41c
                                • Instruction ID: 786c72a28109bdb2c76a827a345e631e5f355446959ee38a56e5bba30da43bc2
                                • Opcode Fuzzy Hash: 2f63c4127990fa7547976ccd6fbab82afe84e060df516028f55638f90560a41c
                                • Instruction Fuzzy Hash: 0312EC71500608AFEB269F24CC59FAABBB8FF45321F114229FD19EB2E0DB708945CB51
                                APIs
                                • GetForegroundWindow.USER32(00000000,00000000), ref: 0030EB4A
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00363AEA
                                • IsIconic.USER32(000000FF), ref: 00363AF3
                                • ShowWindow.USER32(000000FF,00000009), ref: 00363B00
                                • SetForegroundWindow.USER32(000000FF), ref: 00363B0A
                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00363B20
                                • GetCurrentThreadId.KERNEL32 ref: 00363B27
                                • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00363B33
                                • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00363B44
                                • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00363B4C
                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 00363B54
                                • SetForegroundWindow.USER32(000000FF), ref: 00363B57
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00363B6C
                                • keybd_event.USER32(00000012,00000000), ref: 00363B77
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00363B81
                                • keybd_event.USER32(00000012,00000000), ref: 00363B86
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00363B8F
                                • keybd_event.USER32(00000012,00000000), ref: 00363B94
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00363B9E
                                • keybd_event.USER32(00000012,00000000), ref: 00363BA3
                                • SetForegroundWindow.USER32(000000FF), ref: 00363BA6
                                • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00363BCD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                • String ID: Shell_TrayWnd
                                • API String ID: 4125248594-2988720461
                                • Opcode ID: 3166dda29a69ecacad199289a969e84f63748fc94b9fcb9177d991910dfac246
                                • Instruction ID: a7e4c8af0789e10ccc8f1b86be7745a51ea9c0fc0c45ab16d249a20e2c9e63bb
                                • Opcode Fuzzy Hash: 3166dda29a69ecacad199289a969e84f63748fc94b9fcb9177d991910dfac246
                                • Instruction Fuzzy Hash: FF317471A402187BEB326BA59C49F7F7E7CEF45B60F118015FA09EB1D0DAB15D40AAA0
                                APIs
                                  • Part of subcall function 0032B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0032B180
                                  • Part of subcall function 0032B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0032B1AD
                                  • Part of subcall function 0032B134: GetLastError.KERNEL32 ref: 0032B1BA
                                • _memset.LIBCMT ref: 0032AD08
                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 0032AD5A
                                • CloseHandle.KERNEL32(?), ref: 0032AD6B
                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 0032AD82
                                • GetProcessWindowStation.USER32 ref: 0032AD9B
                                • SetProcessWindowStation.USER32(00000000), ref: 0032ADA5
                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0032ADBF
                                  • Part of subcall function 0032AB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0032ACC0), ref: 0032AB99
                                  • Part of subcall function 0032AB84: CloseHandle.KERNEL32(?,?,0032ACC0), ref: 0032ABAB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                • String ID: $H*:$default$winsta0
                                • API String ID: 2063423040-1478248578
                                • Opcode ID: bd5e5e305b1413b679144444f67ddbd62e2bc3e293d89b36ef9a6f78a1bceba8
                                • Instruction ID: deab1cb678162966c81f58686bf45d1ba0e68fc92e6ae3e4b3900c5dcb105aa9
                                • Opcode Fuzzy Hash: bd5e5e305b1413b679144444f67ddbd62e2bc3e293d89b36ef9a6f78a1bceba8
                                • Instruction Fuzzy Hash: E0819CB1800219BFDF239FA4EC49AEEBBB9FF08344F054119F814A6161DB358E95DB61
                                APIs
                                  • Part of subcall function 00336EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00335FA6,?), ref: 00336ED8
                                  • Part of subcall function 00336EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00335FA6,?), ref: 00336EF1
                                  • Part of subcall function 0033725E: __wsplitpath.LIBCMT ref: 0033727B
                                  • Part of subcall function 0033725E: __wsplitpath.LIBCMT ref: 0033728E
                                  • Part of subcall function 003372CB: GetFileAttributesW.KERNEL32(?,00336019), ref: 003372CC
                                • _wcscat.LIBCMT ref: 00336149
                                • _wcscat.LIBCMT ref: 00336167
                                • __wsplitpath.LIBCMT ref: 0033618E
                                • FindFirstFileW.KERNEL32(?,?), ref: 003361A4
                                • _wcscpy.LIBCMT ref: 00336209
                                • _wcscat.LIBCMT ref: 0033621C
                                • _wcscat.LIBCMT ref: 0033622F
                                • lstrcmpiW.KERNEL32(?,?), ref: 0033625D
                                • DeleteFileW.KERNEL32(?), ref: 0033626E
                                • MoveFileW.KERNEL32(?,?), ref: 00336289
                                • MoveFileW.KERNEL32(?,?), ref: 00336298
                                • CopyFileW.KERNEL32(?,?,00000000), ref: 003362AD
                                • DeleteFileW.KERNEL32(?), ref: 003362BE
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 003362E1
                                • FindClose.KERNEL32(00000000), ref: 003362FD
                                • FindClose.KERNEL32(00000000), ref: 0033630B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                • String ID: \*.*
                                • API String ID: 1917200108-1173974218
                                • Opcode ID: 4e19b0232fe570f2513a90a87ebcf5089a51506db7fbf340a267e22abc63e805
                                • Instruction ID: 5290b31cd0b19dc465d58ab14a2ebd331dc063a50ac58e3eaf2fbe5defed11ec
                                • Opcode Fuzzy Hash: 4e19b0232fe570f2513a90a87ebcf5089a51506db7fbf340a267e22abc63e805
                                • Instruction Fuzzy Hash: 1751327280811C6ECB22EB91DC85DEFB7BCAF05300F0645E6E589E7141DE7697898FA4
                                APIs
                                • OpenClipboard.USER32(0038DC00), ref: 00346B36
                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 00346B44
                                • GetClipboardData.USER32(0000000D), ref: 00346B4C
                                • CloseClipboard.USER32 ref: 00346B58
                                • GlobalLock.KERNEL32(00000000), ref: 00346B74
                                • CloseClipboard.USER32 ref: 00346B7E
                                • GlobalUnlock.KERNEL32(00000000), ref: 00346B93
                                • IsClipboardFormatAvailable.USER32(00000001), ref: 00346BA0
                                • GetClipboardData.USER32(00000001), ref: 00346BA8
                                • GlobalLock.KERNEL32(00000000), ref: 00346BB5
                                • GlobalUnlock.KERNEL32(00000000), ref: 00346BE9
                                • CloseClipboard.USER32 ref: 00346CF6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                • String ID:
                                • API String ID: 3222323430-0
                                • Opcode ID: dbbf0056e32185efd25603ad0fe296f48da17638a64bcfd0435126f74b1104d1
                                • Instruction ID: 4a1a037fed8be0c2d563abe34a26701e7ee3447a4af5c651a064385fa4f7f2a6
                                • Opcode Fuzzy Hash: dbbf0056e32185efd25603ad0fe296f48da17638a64bcfd0435126f74b1104d1
                                • Instruction Fuzzy Hash: 9851AF31200205ABD322AF61DD96F7EB7FCEF45B51F100429F64AEA1E1DF60E8458B62
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 0033F62B
                                • FindClose.KERNEL32(00000000), ref: 0033F67F
                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0033F6A4
                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0033F6BB
                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0033F6E2
                                • __swprintf.LIBCMT ref: 0033F72E
                                • __swprintf.LIBCMT ref: 0033F767
                                • __swprintf.LIBCMT ref: 0033F7BB
                                  • Part of subcall function 0031172B: __woutput_l.LIBCMT ref: 00311784
                                • __swprintf.LIBCMT ref: 0033F809
                                • __swprintf.LIBCMT ref: 0033F858
                                • __swprintf.LIBCMT ref: 0033F8A7
                                • __swprintf.LIBCMT ref: 0033F8F6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                • API String ID: 835046349-2428617273
                                • Opcode ID: ebb3d3487dc91dbe799d5a11c5ff1af98e8ff45d6ab76101b14b7e4a4eec5cb9
                                • Instruction ID: 8776b9bec50576f08a4024162d12720f6d5d181701353bf578f37f93545dd14b
                                • Opcode Fuzzy Hash: ebb3d3487dc91dbe799d5a11c5ff1af98e8ff45d6ab76101b14b7e4a4eec5cb9
                                • Instruction Fuzzy Hash: BAA130B2418344ABC315EB94C995DBFB7ECAF98344F400C2EF685C6192EB34D959CB62
                                APIs
                                • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00341B50
                                • _wcscmp.LIBCMT ref: 00341B65
                                • _wcscmp.LIBCMT ref: 00341B7C
                                • GetFileAttributesW.KERNEL32(?), ref: 00341B8E
                                • SetFileAttributesW.KERNEL32(?,?), ref: 00341BA8
                                • FindNextFileW.KERNEL32(00000000,?), ref: 00341BC0
                                • FindClose.KERNEL32(00000000), ref: 00341BCB
                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00341BE7
                                • _wcscmp.LIBCMT ref: 00341C0E
                                • _wcscmp.LIBCMT ref: 00341C25
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00341C37
                                • SetCurrentDirectoryW.KERNEL32(003A39FC), ref: 00341C55
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00341C5F
                                • FindClose.KERNEL32(00000000), ref: 00341C6C
                                • FindClose.KERNEL32(00000000), ref: 00341C7C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                • String ID: *.*
                                • API String ID: 1803514871-438819550
                                • Opcode ID: 66ae8b78d2197a00cbc36ef12a693be6bc652eafc4392dcbbd7d89c4e0d62524
                                • Instruction ID: 0dca2e1aba56375b0aa331f1ef990fc129859f82c616d5978b054896dbc4e3e6
                                • Opcode Fuzzy Hash: 66ae8b78d2197a00cbc36ef12a693be6bc652eafc4392dcbbd7d89c4e0d62524
                                • Instruction Fuzzy Hash: D931D332541619ABDF26ABA0DC89ADE77FCDF06320F1001A5F915E6091EB70EEC58B64
                                APIs
                                • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00341CAB
                                • _wcscmp.LIBCMT ref: 00341CC0
                                • _wcscmp.LIBCMT ref: 00341CD7
                                  • Part of subcall function 00336BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00336BEF
                                • FindNextFileW.KERNEL32(00000000,?), ref: 00341D06
                                • FindClose.KERNEL32(00000000), ref: 00341D11
                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00341D2D
                                • _wcscmp.LIBCMT ref: 00341D54
                                • _wcscmp.LIBCMT ref: 00341D6B
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00341D7D
                                • SetCurrentDirectoryW.KERNEL32(003A39FC), ref: 00341D9B
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00341DA5
                                • FindClose.KERNEL32(00000000), ref: 00341DB2
                                • FindClose.KERNEL32(00000000), ref: 00341DC2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                • String ID: *.*
                                • API String ID: 1824444939-438819550
                                • Opcode ID: c93e9268fd1201b36956c36d1819e25533a525b45daabc5a18f192d9612e9d80
                                • Instruction ID: d8361093cf3b4dc10be8dc05894d1b226f1fda28d2345fc7b8e4e849715fda16
                                • Opcode Fuzzy Hash: c93e9268fd1201b36956c36d1819e25533a525b45daabc5a18f192d9612e9d80
                                • Instruction Fuzzy Hash: F7312871901A19AACF27AFA0DC49AEE77FD9F06320F110555F805AB091DB70EEC58F64
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _memset
                                • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
                                • API String ID: 2102423945-2023335898
                                • Opcode ID: 062d0f65fcc211a49b652a1ff62c003e0745a2f1449a03a946eb319f99f4ccb8
                                • Instruction ID: ea3de6a95c57932a3fc8f3ac44cd743aa99a497420ecf9ca2c6d177758ae8bab
                                • Opcode Fuzzy Hash: 062d0f65fcc211a49b652a1ff62c003e0745a2f1449a03a946eb319f99f4ccb8
                                • Instruction Fuzzy Hash: 5282DF71D2421ACFCB25CF98C8806BDFBB1BF48350F25817AD919AB245E7749D91CB90
                                APIs
                                • GetLocalTime.KERNEL32(?), ref: 003409DF
                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 003409EF
                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 003409FB
                                • __wsplitpath.LIBCMT ref: 00340A59
                                • _wcscat.LIBCMT ref: 00340A71
                                • _wcscat.LIBCMT ref: 00340A83
                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00340A98
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00340AAC
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00340ADE
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00340AFF
                                • _wcscpy.LIBCMT ref: 00340B0B
                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00340B4A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                • String ID: *.*
                                • API String ID: 3566783562-438819550
                                • Opcode ID: 0721f9d66ed23263eaea3c0361cbeea401998c32d572ad5ca0b3fcae401bc257
                                • Instruction ID: dfc18fd9f64bf1258637c4e381277a686784ce7d739d78e34c71942b0ff70a9e
                                • Opcode Fuzzy Hash: 0721f9d66ed23263eaea3c0361cbeea401998c32d572ad5ca0b3fcae401bc257
                                • Instruction Fuzzy Hash: 9C614B726043059FD715EF60C8859AEB3E8FF89314F04492AFA89DB252DB31E945CF92
                                APIs
                                  • Part of subcall function 0032ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0032ABD7
                                  • Part of subcall function 0032ABBB: GetLastError.KERNEL32(?,0032A69F,?,?,?), ref: 0032ABE1
                                  • Part of subcall function 0032ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0032A69F,?,?,?), ref: 0032ABF0
                                  • Part of subcall function 0032ABBB: HeapAlloc.KERNEL32(00000000,?,0032A69F,?,?,?), ref: 0032ABF7
                                  • Part of subcall function 0032ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0032AC0E
                                  • Part of subcall function 0032AC56: GetProcessHeap.KERNEL32(00000008,0032A6B5,00000000,00000000,?,0032A6B5,?), ref: 0032AC62
                                  • Part of subcall function 0032AC56: HeapAlloc.KERNEL32(00000000,?,0032A6B5,?), ref: 0032AC69
                                  • Part of subcall function 0032AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0032A6B5,?), ref: 0032AC7A
                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0032A6D0
                                • _memset.LIBCMT ref: 0032A6E5
                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0032A704
                                • GetLengthSid.ADVAPI32(?), ref: 0032A715
                                • GetAce.ADVAPI32(?,00000000,?), ref: 0032A752
                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0032A76E
                                • GetLengthSid.ADVAPI32(?), ref: 0032A78B
                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0032A79A
                                • HeapAlloc.KERNEL32(00000000), ref: 0032A7A1
                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0032A7C2
                                • CopySid.ADVAPI32(00000000), ref: 0032A7C9
                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0032A7FA
                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0032A820
                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0032A834
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                • String ID:
                                • API String ID: 3996160137-0
                                • Opcode ID: b0ba6ccbc5856de0475797718556a596167d62a673a3952f38aef587a7eff979
                                • Instruction ID: 417a23077f6cfb5fd4e28ab7dc7b4d5f99fa6c1c7714e858dca49ada03ed3094
                                • Opcode Fuzzy Hash: b0ba6ccbc5856de0475797718556a596167d62a673a3952f38aef587a7eff979
                                • Instruction Fuzzy Hash: E7515A71900619AFDF12DFA5EC44EEEBBB9FF04300F148129F915AB290DB349A46CB61
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID: 9$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$999 9
                                • API String ID: 0-2693932307
                                • Opcode ID: c5dd8aa22f0f07186ed1334047e331b920f1f7ee8f4f6d1c95423ca6be1ea938
                                • Instruction ID: d5c2bb362768443ba2492a8f85b8f268994a0a97a2f18e757e7ea252f4148cba
                                • Opcode Fuzzy Hash: c5dd8aa22f0f07186ed1334047e331b920f1f7ee8f4f6d1c95423ca6be1ea938
                                • Instruction Fuzzy Hash: A4727E71E14219DBDB25CF58C8807BEB7B5FF48350F14816AE919EB280EB749E81DB90
                                APIs
                                  • Part of subcall function 00336EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00335FA6,?), ref: 00336ED8
                                  • Part of subcall function 003372CB: GetFileAttributesW.KERNEL32(?,00336019), ref: 003372CC
                                • _wcscat.LIBCMT ref: 00336441
                                • __wsplitpath.LIBCMT ref: 0033645F
                                • FindFirstFileW.KERNEL32(?,?), ref: 00336474
                                • _wcscpy.LIBCMT ref: 003364A3
                                • _wcscat.LIBCMT ref: 003364B8
                                • _wcscat.LIBCMT ref: 003364CA
                                • DeleteFileW.KERNEL32(?), ref: 003364DA
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 003364EB
                                • FindClose.KERNEL32(00000000), ref: 00336506
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                • String ID: \*.*
                                • API String ID: 2643075503-1173974218
                                • Opcode ID: ed58eabf96b828d7aff283bcea0f57afdac79a0b6f164dd4299f99b9d5b30f2f
                                • Instruction ID: bfcd701f09e6fc4a72972a079f4d02f04ec2e6ea0af16c6681fc65037f8e3aa5
                                • Opcode Fuzzy Hash: ed58eabf96b828d7aff283bcea0f57afdac79a0b6f164dd4299f99b9d5b30f2f
                                • Instruction Fuzzy Hash: 3931B6B2408384AEC322DBA488859DBB7ECAF5A300F40492EF5D8C7141EA35D54D87A7
                                APIs
                                  • Part of subcall function 00353C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00352BB5,?,?), ref: 00353C1D
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0035328E
                                  • Part of subcall function 002F936C: __swprintf.LIBCMT ref: 002F93AB
                                  • Part of subcall function 002F936C: __itow.LIBCMT ref: 002F93DF
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0035332D
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 003533C5
                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00353604
                                • RegCloseKey.ADVAPI32(00000000), ref: 00353611
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                • String ID:
                                • API String ID: 1240663315-0
                                • Opcode ID: 61f15c3a551708ca32164f37b670073b60becacc04f766636d07fa98a5ce2d4e
                                • Instruction ID: e274bc3d83e235dba771bb4a695e72f0ff17faa156c29b840408b05977b90843
                                • Opcode Fuzzy Hash: 61f15c3a551708ca32164f37b670073b60becacc04f766636d07fa98a5ce2d4e
                                • Instruction Fuzzy Hash: AEE16B75604204AFCB15DF29C995E2ABBE8FF89354F04886DF94ADB2A1DB30E905CF41
                                APIs
                                • GetKeyboardState.USER32(?), ref: 00332B5F
                                • GetAsyncKeyState.USER32(000000A0), ref: 00332BE0
                                • GetKeyState.USER32(000000A0), ref: 00332BFB
                                • GetAsyncKeyState.USER32(000000A1), ref: 00332C15
                                • GetKeyState.USER32(000000A1), ref: 00332C2A
                                • GetAsyncKeyState.USER32(00000011), ref: 00332C42
                                • GetKeyState.USER32(00000011), ref: 00332C54
                                • GetAsyncKeyState.USER32(00000012), ref: 00332C6C
                                • GetKeyState.USER32(00000012), ref: 00332C7E
                                • GetAsyncKeyState.USER32(0000005B), ref: 00332C96
                                • GetKeyState.USER32(0000005B), ref: 00332CA8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: State$Async$Keyboard
                                • String ID:
                                • API String ID: 541375521-0
                                • Opcode ID: 152d23cb4ca7d7145eb41268105b1bbc25cbd7de0d6156361b91669c72f385f6
                                • Instruction ID: eb95b8d9731f38be4084558cd70a9bf3cd5de8a3d07f4b3cbef4c2881c7491bd
                                • Opcode Fuzzy Hash: 152d23cb4ca7d7145eb41268105b1bbc25cbd7de0d6156361b91669c72f385f6
                                • Instruction Fuzzy Hash: 4541C8345047C96EFF379B6488843BBFFB06F12354F099059E9C6562C2DBA499C8C7A2
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                • String ID:
                                • API String ID: 1737998785-0
                                • Opcode ID: bccf92230938d9e8de9be9a02e7943ed8b7622505d61025c3268bb883950d817
                                • Instruction ID: 4f210b37b12aa1fa175d3ed7c7d42a17f64c12f417693f648a9c70bbac733e11
                                • Opcode Fuzzy Hash: bccf92230938d9e8de9be9a02e7943ed8b7622505d61025c3268bb883950d817
                                • Instruction Fuzzy Hash: 10218B31700110AFDB22AF64DC5AB6E77E8EF45711F018419F90AAB2A1CB30E8818B51
                                APIs
                                  • Part of subcall function 00329ABF: CLSIDFromProgID.OLE32 ref: 00329ADC
                                  • Part of subcall function 00329ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00329AF7
                                  • Part of subcall function 00329ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00329B05
                                  • Part of subcall function 00329ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00329B15
                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 0034C235
                                • _memset.LIBCMT ref: 0034C242
                                • _memset.LIBCMT ref: 0034C360
                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 0034C38C
                                • CoTaskMemFree.OLE32(?), ref: 0034C397
                                Strings
                                • NULL Pointer assignment, xrefs: 0034C3E5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                • String ID: NULL Pointer assignment
                                • API String ID: 1300414916-2785691316
                                • Opcode ID: 56806da92379135bbeb8a1bd19d973489b117dc4c1176af283580dd3ca6b7858
                                • Instruction ID: 4dfb9528db93a7500870dc1f8fd0afe2f0fe60bb9780d654ac843e9a174a1cb4
                                • Opcode Fuzzy Hash: 56806da92379135bbeb8a1bd19d973489b117dc4c1176af283580dd3ca6b7858
                                • Instruction Fuzzy Hash: 07917E71D11218ABDB12DF95DC55EEEFBB8EF08350F10812AF519AB281DB706A45CFA0
                                APIs
                                  • Part of subcall function 0032B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0032B180
                                  • Part of subcall function 0032B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0032B1AD
                                  • Part of subcall function 0032B134: GetLastError.KERNEL32 ref: 0032B1BA
                                • ExitWindowsEx.USER32(?,00000000), ref: 00337A0F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                • String ID: $@$SeShutdownPrivilege
                                • API String ID: 2234035333-194228
                                • Opcode ID: 9c2b32f8b6bfc50cae5196ead5cc2779a337f0b054ad6bf56622b7a6935288f6
                                • Instruction ID: 7c37cea810119163fd17b5cd38c87fb2fb680aedb9c2c4803e8cd5af6f2eca92
                                • Opcode Fuzzy Hash: 9c2b32f8b6bfc50cae5196ead5cc2779a337f0b054ad6bf56622b7a6935288f6
                                • Instruction Fuzzy Hash: DF01A7F16582216BF73B56649CDBBBF736C9B00741F150924FD43A62D2E6619E4091B0
                                APIs
                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00348CA8
                                • WSAGetLastError.WSOCK32(00000000), ref: 00348CB7
                                • bind.WSOCK32(00000000,?,00000010), ref: 00348CD3
                                • listen.WSOCK32(00000000,00000005), ref: 00348CE2
                                • WSAGetLastError.WSOCK32(00000000), ref: 00348CFC
                                • closesocket.WSOCK32(00000000,00000000), ref: 00348D10
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorLast$bindclosesocketlistensocket
                                • String ID:
                                • API String ID: 1279440585-0
                                • Opcode ID: a02f1c8aedad028b495e24bc1dd977b7d2ed556faca2ac1ec369e15c84337a04
                                • Instruction ID: 418c0e9a4d828ac4c2956398001bd11415f4279519fbbbb2937f35d75549f2a5
                                • Opcode Fuzzy Hash: a02f1c8aedad028b495e24bc1dd977b7d2ed556faca2ac1ec369e15c84337a04
                                • Instruction Fuzzy Hash: D621D3316002049FCB26EF68CD85B6EB7F9EF49710F158158F916AB3D2CB30AD818B51
                                APIs
                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00336554
                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00336564
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 00336583
                                • __wsplitpath.LIBCMT ref: 003365A7
                                • _wcscat.LIBCMT ref: 003365BA
                                • CloseHandle.KERNEL32(00000000,?,00000000), ref: 003365F9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                • String ID:
                                • API String ID: 1605983538-0
                                • Opcode ID: 131d29bbe6b20935f0277c4cb89038850045240e508aa0128966bf4fe238f929
                                • Instruction ID: dfc4bf16661aa49aa1c1b2543bf564ebbaf7b6364bcc56c01b17f0cb5e18a747
                                • Opcode Fuzzy Hash: 131d29bbe6b20935f0277c4cb89038850045240e508aa0128966bf4fe238f929
                                • Instruction Fuzzy Hash: 22214F71900219AFEB22ABA4DCC9BEEB7BCAB49300F5044A5E505E7141EB719B85CB60
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID: ERCP$VUUU$VUUU$VUUU$VUUU$9
                                • API String ID: 0-3235341201
                                • Opcode ID: b328ead2763824fc05543e5ed0e966336af0bae39c674faf924b4cd91627fb1b
                                • Instruction ID: 0324c098d1de2a8ba88a8e45e440790ef6c264eab1638d98e425a32c2114fa0e
                                • Opcode Fuzzy Hash: b328ead2763824fc05543e5ed0e966336af0bae39c674faf924b4cd91627fb1b
                                • Instruction Fuzzy Hash: 4C929C71A2021ACBDF35CF58C8807BDF3B1BB54354F2581AAE91AAB280D7749D91CF91
                                APIs
                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 003313DC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: lstrlen
                                • String ID: ($,2:$<2:$|
                                • API String ID: 1659193697-2637774085
                                • Opcode ID: 07fc532f5fd4252c4c793ccd48421234c8e150633848117d3c2e929761d849f8
                                • Instruction ID: 5d6b49c7b644dc19675815262c283fb77713d98f426fc2c2f70080b19750c78b
                                • Opcode Fuzzy Hash: 07fc532f5fd4252c4c793ccd48421234c8e150633848117d3c2e929761d849f8
                                • Instruction Fuzzy Hash: 15321475A006059FC729CF69C480A6AB7F0FF48320F16C56EE59ADB7A1E770E981CB44
                                APIs
                                  • Part of subcall function 0034A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0034A84E
                                • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 00349296
                                • WSAGetLastError.WSOCK32(00000000,00000000), ref: 003492B9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorLastinet_addrsocket
                                • String ID:
                                • API String ID: 4170576061-0
                                • Opcode ID: d50dace54065b7b551b21a66b4f0b817e89c3fbe6fb7250d15b66c6e54149090
                                • Instruction ID: 8ecea7b48bee2466a5ac0796432d1fce739b7833bc0b9d4f0d9b68f00b1c96dd
                                • Opcode Fuzzy Hash: d50dace54065b7b551b21a66b4f0b817e89c3fbe6fb7250d15b66c6e54149090
                                • Instruction Fuzzy Hash: 0A41DE70600204AFEB16AF28C896E7FB7EDEF44324F044459F916AF2D2CB74AD418B91
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 0033EB8A
                                • _wcscmp.LIBCMT ref: 0033EBBA
                                • _wcscmp.LIBCMT ref: 0033EBCF
                                • FindNextFileW.KERNEL32(00000000,?), ref: 0033EBE0
                                • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0033EC0E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Find$File_wcscmp$CloseFirstNext
                                • String ID:
                                • API String ID: 2387731787-0
                                • Opcode ID: 69f92bce840d09820da842ef75fa71c3f2af1e4567657f0017251c076f0c9f27
                                • Instruction ID: 1425c2185c9b6d1ddf027fec90e7ac134e7d6b015a4de23a5c9db6578c5d19d4
                                • Opcode Fuzzy Hash: 69f92bce840d09820da842ef75fa71c3f2af1e4567657f0017251c076f0c9f27
                                • Instruction Fuzzy Hash: DD41AC356043028FC71ADF28C4D1EAAB3E8FF49324F10455DE95A8B3E1DB31A984CB91
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                • String ID:
                                • API String ID: 292994002-0
                                • Opcode ID: d2d34a367de75c67a97fc6f3676aecc52c4e0140f9a35167586a04f2e193d5f7
                                • Instruction ID: a7de14dc9fc856587f01a3bc89c56f02dbded21bb7d335071c90e40e8b2f37a0
                                • Opcode Fuzzy Hash: d2d34a367de75c67a97fc6f3676aecc52c4e0140f9a35167586a04f2e193d5f7
                                • Instruction Fuzzy Hash: D611B2313009156BE7235F26DC44E6FB7ADEF45762F050429FC49E72A1CF309A468BA0
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,0030E014,771B0AE0,0030DEF1,0038DC38,?,?), ref: 0030E02C
                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0030E03E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: GetNativeSystemInfo$kernel32.dll
                                • API String ID: 2574300362-192647395
                                • Opcode ID: 7e8e82a268f1962ab892e0ab1a06e9b39755e3d25aab9a70e992ec30a9dc9e3e
                                • Instruction ID: 251f8bfb4a74a396082889bd221f2feb2ddc3325fb5d96d65dfee05d261e088f
                                • Opcode Fuzzy Hash: 7e8e82a268f1962ab892e0ab1a06e9b39755e3d25aab9a70e992ec30a9dc9e3e
                                • Instruction Fuzzy Hash: 7CD0A7B15007129FC7334F65EC08A5377E8EF01310F19481AE887D2590D7B4C8C0C750
                                APIs
                                  • Part of subcall function 0030B34E: GetWindowLongW.USER32(?,000000EB), ref: 0030B35F
                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 0030B22F
                                  • Part of subcall function 0030B55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 0030B5A5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Proc$LongWindow
                                • String ID:
                                • API String ID: 2749884682-0
                                • Opcode ID: 27a34bde9815b9a1acd6f908edc5e176c3ecb4f57d5b9c2e63657f6cc2fa1674
                                • Instruction ID: ecf7bdf2bc94b208fe77042c17e75ec7c4142ec39f9a336984bed17b39581176
                                • Opcode Fuzzy Hash: 27a34bde9815b9a1acd6f908edc5e176c3ecb4f57d5b9c2e63657f6cc2fa1674
                                • Instruction Fuzzy Hash: 61A19974016004FADB3B6B2A4CB9EBFAA5CEB42744F628919F902DADD5DF14DC04D272
                                APIs
                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,003443BF,00000000), ref: 00344FA6
                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00344FD2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Internet$AvailableDataFileQueryRead
                                • String ID:
                                • API String ID: 599397726-0
                                • Opcode ID: 827edeabb8ff602a10b0a94cc78e124b6103567b8f161c476c52f51d7f6bb282
                                • Instruction ID: 832fdae17435e500a40400f4a0b83061a78236f7ee1f4e6410ada44ae4861f84
                                • Opcode Fuzzy Hash: 827edeabb8ff602a10b0a94cc78e124b6103567b8f161c476c52f51d7f6bb282
                                • Instruction Fuzzy Hash: 9341E675904609BFEB22DE84DC81FBFB7FCEB40754F10402AF605AE181DA71BE8596A0
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \Q:
                                • API String ID: 4104443479-4283153249
                                • Opcode ID: 77114536916dcadc2d3d6289791c334eadc070f51e40835d392a718ff7f49153
                                • Instruction ID: 3b85f7d18133ccf85f6e59b9617c475131f8e9a5e96c298017e31eec853f320a
                                • Opcode Fuzzy Hash: 77114536916dcadc2d3d6289791c334eadc070f51e40835d392a718ff7f49153
                                • Instruction Fuzzy Hash: A8A27A71A14219CFCB25CF58C8806ADFBB1FF48354F2681AAD959AB390D7749E91CF80
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0033E20D
                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0033E267
                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0033E2B4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorMode$DiskFreeSpace
                                • String ID:
                                • API String ID: 1682464887-0
                                • Opcode ID: 139d245c463abdae29458d5e77bf8fa56e443c992ba0a0a48b124396cd3da515
                                • Instruction ID: 041fe9d44f4e10241b29d848ebe1c8def0593040280b91b2cd29cb4924eb12ab
                                • Opcode Fuzzy Hash: 139d245c463abdae29458d5e77bf8fa56e443c992ba0a0a48b124396cd3da515
                                • Instruction Fuzzy Hash: DA216D35A10118EFCB01EFA5D885EEEFBB8FF48310F0484A9E906EB291DB319955CB50
                                APIs
                                  • Part of subcall function 0030F4EA: std::exception::exception.LIBCMT ref: 0030F51E
                                  • Part of subcall function 0030F4EA: __CxxThrowException@8.LIBCMT ref: 0030F533
                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0032B180
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0032B1AD
                                • GetLastError.KERNEL32 ref: 0032B1BA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                • String ID:
                                • API String ID: 1922334811-0
                                • Opcode ID: c9a08fab9ec0121005c6847e5a57c38f3ef49880a359de7214fdb5bd1cc4183d
                                • Instruction ID: 5cee57c504f6c3a65399350e07f92261af198ef70d13135f85050820b29bb04c
                                • Opcode Fuzzy Hash: c9a08fab9ec0121005c6847e5a57c38f3ef49880a359de7214fdb5bd1cc4183d
                                • Instruction Fuzzy Hash: 10119EB2514205AFE729AF64ECD6D2BB7BDFF44710B20852EE49A97640DB70FC41CA60
                                APIs
                                • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00336623
                                • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00336664
                                • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0033666F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CloseControlCreateDeviceFileHandle
                                • String ID:
                                • API String ID: 33631002-0
                                • Opcode ID: b45b9a12b3641a3366f6edc9f86a480e0e0d6521d8747b806d37d6c72342d534
                                • Instruction ID: 5c676e6a1e129c19d51a065f44f40ac0cc9d4abd1951e52a3fb062ee9e26a259
                                • Opcode Fuzzy Hash: b45b9a12b3641a3366f6edc9f86a480e0e0d6521d8747b806d37d6c72342d534
                                • Instruction Fuzzy Hash: CA111E71E01228BFEB118FA5DC45BAEBBFCEB49B50F108156F904E6290D7B05A058BA5
                                APIs
                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00337223
                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0033723A
                                • FreeSid.ADVAPI32(?), ref: 0033724A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                • String ID:
                                • API String ID: 3429775523-0
                                • Opcode ID: 1640632146327f60f42d20b752425a340886c54dc618ffa3864e375fe6ceb08f
                                • Instruction ID: 4643ae7132412f416977527a2979bf40ce0a6b7d27371b8477d339d2b35edffc
                                • Opcode Fuzzy Hash: 1640632146327f60f42d20b752425a340886c54dc618ffa3864e375fe6ceb08f
                                • Instruction Fuzzy Hash: 91F01776A04209FFDF15DFE4DD89EEEBBBCEF08301F105869A606E2191E2709A448B10
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 0033F599
                                • FindClose.KERNEL32(00000000), ref: 0033F5C9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Find$CloseFileFirst
                                • String ID:
                                • API String ID: 2295610775-0
                                • Opcode ID: e1121b1c8a0597b6c8e8aa49b2b89ca1b488f9daa5d600fa3822ce4d94cd0018
                                • Instruction ID: a1636f66ff5898a10417b1b7989bc18722581ffb9cb97248dab751fe872eb168
                                • Opcode Fuzzy Hash: e1121b1c8a0597b6c8e8aa49b2b89ca1b488f9daa5d600fa3822ce4d94cd0018
                                • Instruction Fuzzy Hash: 1D11C4316002009FD711EF28D849A2EF3E8FF85324F00892EF8A9DB291CB30AD048B81
                                APIs
                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0034BE6A,?,?,00000000,?), ref: 0033CEA7
                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0034BE6A,?,?,00000000,?), ref: 0033CEB9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorFormatLastMessage
                                • String ID:
                                • API String ID: 3479602957-0
                                • Opcode ID: b01a17fd13f4c5f44a3c38fd4e29ee8a84710ec8de20fe95e8e57fdc599843f9
                                • Instruction ID: 23a81feb70c973bfb0bf781be99db464dc2c76ae5f62a71e32e45fd6bed23c44
                                • Opcode Fuzzy Hash: b01a17fd13f4c5f44a3c38fd4e29ee8a84710ec8de20fe95e8e57fdc599843f9
                                • Instruction Fuzzy Hash: 95F0823511422DABEB219BA4DC89FEA777DBF083A1F004165F919E6181D7709A40CBA0
                                APIs
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00334153
                                • keybd_event.USER32(?,75A4C0D0,?,00000000), ref: 00334166
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: InputSendkeybd_event
                                • String ID:
                                • API String ID: 3536248340-0
                                • Opcode ID: 6418b02b3043e7a5fc9b60c0cd7218001897f229bb2ba964a9fbcdc1f1795a87
                                • Instruction ID: 6f0b5b6a3d91e9216c4328378920d44c3ee2ce79aaf3d091b34b6c202d63f7f5
                                • Opcode Fuzzy Hash: 6418b02b3043e7a5fc9b60c0cd7218001897f229bb2ba964a9fbcdc1f1795a87
                                • Instruction Fuzzy Hash: F3F09A7080034DAFDB068FA0C845BBE7FB4EF00315F00804AF966A6292D779D652DFA0
                                APIs
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0032ACC0), ref: 0032AB99
                                • CloseHandle.KERNEL32(?,?,0032ACC0), ref: 0032ABAB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AdjustCloseHandlePrivilegesToken
                                • String ID:
                                • API String ID: 81990902-0
                                • Opcode ID: 3f61dcfa000f4fc160d75f69c58805c8816383218cd4df54ee45659dce9c5c12
                                • Instruction ID: 988eb4d4288102549af267ec901e9c76f1d9bdf1df37f08dc9e8e4bfb58dfc7d
                                • Opcode Fuzzy Hash: 3f61dcfa000f4fc160d75f69c58805c8816383218cd4df54ee45659dce9c5c12
                                • Instruction Fuzzy Hash: 23E0BF75000510AFE7362F54FC15D767BADEF04320B108429B49985871D7625D90DB50
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00316DB3,-0000031A,?,?,00000001), ref: 003181B1
                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 003181BA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: ca49415d6371e30ca1fcb0015e2934a5141caed3de15e12871dd4d6ac76d815a
                                • Instruction ID: ae9c16104081af6aefa4f22bad99f7b50531d8a2839c14fbeebb7e0688b75b55
                                • Opcode Fuzzy Hash: ca49415d6371e30ca1fcb0015e2934a5141caed3de15e12871dd4d6ac76d815a
                                • Instruction Fuzzy Hash: F5B09235044608ABEB122BA1EC09B587FBCEF08762F004014F60D480618B7254909AA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 972645130f3db428a8da38220ee1d8852f40aabcaa10260d018f5f5c958a825b
                                • Instruction ID: 82940e88629f156a2c2446beed90ce687b9a13620f6dde1d8b2b3895f7fefe22
                                • Opcode Fuzzy Hash: 972645130f3db428a8da38220ee1d8852f40aabcaa10260d018f5f5c958a825b
                                • Instruction Fuzzy Hash: 6A32E432D29F014DDB275635D921336A29CAFBB3D4F15D727E819B5DAADB29C4C34100
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __itow__swprintf
                                • String ID:
                                • API String ID: 674341424-0
                                • Opcode ID: c7f0db2888ae12355cd974159c11b8b843899e60f798c428370e8150e9cc1918
                                • Instruction ID: 4a1358d26166af92fb12dce54a7b6a656301b6364e4d9de3c2a9a5f340b5c99e
                                • Opcode Fuzzy Hash: c7f0db2888ae12355cd974159c11b8b843899e60f798c428370e8150e9cc1918
                                • Instruction Fuzzy Hash: 7422BA716283059FD725DF24C890B6FF7E4AF84344F10492DFA9A8B291DB71E994CB82
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 48bad1253774f98fb00f07b0f01b3b1e6c65e633d8bec47f87f0d0cf2faa0072
                                • Instruction ID: 1cfc603d30f6b9f5271aaa68ce54e7bfc305f45b6a5ebf4df2c6346a8fe37975
                                • Opcode Fuzzy Hash: 48bad1253774f98fb00f07b0f01b3b1e6c65e633d8bec47f87f0d0cf2faa0072
                                • Instruction Fuzzy Hash: CBB1F070D2AF514DD62396399831336B65CAFBB3D5FA1D71BFC2A74D22EB2185834280
                                APIs
                                • __time64.LIBCMT ref: 0033B6DF
                                  • Part of subcall function 0031344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,0033BDC3,00000000,?,?,?,?,0033BF70,00000000,?), ref: 00313453
                                  • Part of subcall function 0031344A: __aulldiv.LIBCMT ref: 00313473
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Time$FileSystem__aulldiv__time64
                                • String ID:
                                • API String ID: 2893107130-0
                                • Opcode ID: 01d9623d99c69545a745fd97ede7b36d44229839c87fa2c7d27da6d28e845a72
                                • Instruction ID: d69851ed6d029e5a12170e089d072e174450fc090696950a504ab848c95208fc
                                • Opcode Fuzzy Hash: 01d9623d99c69545a745fd97ede7b36d44229839c87fa2c7d27da6d28e845a72
                                • Instruction Fuzzy Hash: 3921AF766345108BC72ACF28C881A92F7E5EB95314F248E6DE1E9CF2C0CB74BA05CB54
                                APIs
                                • BlockInput.USER32(00000001), ref: 00346ACA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: BlockInput
                                • String ID:
                                • API String ID: 3456056419-0
                                • Opcode ID: deac5b36f27c5e306bd0ccdb19e0ad4a2f835c423539e206f63f0da584788aa7
                                • Instruction ID: dc45c10b35ea0a7f7d7ae27ce27ea48d4429509be819b33061a16a223d8604a1
                                • Opcode Fuzzy Hash: deac5b36f27c5e306bd0ccdb19e0ad4a2f835c423539e206f63f0da584788aa7
                                • Instruction Fuzzy Hash: 7FE0D8352002046FD700EF5DD405D56F7EDAF74351F04C426F909DB291CAB0F8048B91
                                APIs
                                • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 003374DE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: mouse_event
                                • String ID:
                                • API String ID: 2434400541-0
                                • Opcode ID: 03b816f4515301dae5b37154488cf7208c47c8c14f6f8d7542d3a0a3401c4b59
                                • Instruction ID: 3cab29a1cf776f8769366e946903a684e865746b88ef9964ad50a2927941d335
                                • Opcode Fuzzy Hash: 03b816f4515301dae5b37154488cf7208c47c8c14f6f8d7542d3a0a3401c4b59
                                • Instruction Fuzzy Hash: 4BD05EE012C30939EC3B17269C8FF76494CF3007C0F828189B082C94C3B8807841A232
                                APIs
                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,0032AD3E), ref: 0032B124
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: LogonUser
                                • String ID:
                                • API String ID: 1244722697-0
                                • Opcode ID: dc595d7b5b90597ef02db409f7d60cdcb9ab4f6c0967f9e6825bf9af6661419e
                                • Instruction ID: 53c184b40830529c1b931a9e2395c85d867ed25c9bc4054f3bec9f2176aac80e
                                • Opcode Fuzzy Hash: dc595d7b5b90597ef02db409f7d60cdcb9ab4f6c0967f9e6825bf9af6661419e
                                • Instruction Fuzzy Hash: 81D05E320A460EAEDF024FA4DC02EAE3F6AEB04700F408110FA15D50A0C671D531AB50
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: NameUser
                                • String ID:
                                • API String ID: 2645101109-0
                                • Opcode ID: dab36c8ecf601772877ae376067127c2192c199954e4a85065383d38321a3efc
                                • Instruction ID: 48daab598f59ac2b551ac4ca74216df2c712033eb2fe45d1d5cea128d8cd9801
                                • Opcode Fuzzy Hash: dab36c8ecf601772877ae376067127c2192c199954e4a85065383d38321a3efc
                                • Instruction Fuzzy Hash: D1C04CB1400509DFC752CBC0C9449EEB7BCAB04701F1050919106F1110D7709B859F72
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0031818F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: 3a6b70ca6c3a1c1d3409c7cfa7c666d1fb04e7277e9039e1796afe0aa089bd88
                                • Instruction ID: 200fcecd5e50660e20e994386c93a2a16b6bf64fcf77a818dde7af5811bcb362
                                • Opcode Fuzzy Hash: 3a6b70ca6c3a1c1d3409c7cfa7c666d1fb04e7277e9039e1796afe0aa089bd88
                                • Instruction Fuzzy Hash: 20A0113000020CAB8F022B82EC088883FACEA002A0B000020F80C080208B22A8A0AAA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 51aaf28cbcc06e6ba5204f008cf7535d21f2b5e105a5355724e6d8d06064dd19
                                • Instruction ID: aec5067d7f4a5f5b26c89a8c94941464b1ef605ef0e2399d81d0ff5a8c7c120c
                                • Opcode Fuzzy Hash: 51aaf28cbcc06e6ba5204f008cf7535d21f2b5e105a5355724e6d8d06064dd19
                                • Instruction Fuzzy Hash: 2C12AD70A006099FDF05DFA4D981ABEF7F9FF48340F108529E906E7254EB36A960CB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6c80386a47ac4a1262f3330256143f91ad7880e7eb2b0ca9a62555f925f4c09a
                                • Instruction ID: 60b03602bd46961acf772a2b5cee293034551e6695661d86a03aa5e4cde75e2f
                                • Opcode Fuzzy Hash: 6c80386a47ac4a1262f3330256143f91ad7880e7eb2b0ca9a62555f925f4c09a
                                • Instruction Fuzzy Hash: 1E12BD7092020A8FDF26DF58C490ABEF7B1FF14344F168079DA469B361E371A991CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Exception@8Throwstd::exception::exception
                                • String ID:
                                • API String ID: 3728558374-0
                                • Opcode ID: 3f386fed8d2ebfff4b4f1d10537b5690bafb04ff287144486cd4e76438a34c0b
                                • Instruction ID: 49b7067c72825d6c6deacf6059d1d17e34020ba83a1dc15a6d4f9db57973eb9f
                                • Opcode Fuzzy Hash: 3f386fed8d2ebfff4b4f1d10537b5690bafb04ff287144486cd4e76438a34c0b
                                • Instruction Fuzzy Hash: 6102AE70A10109DFCF16DF68D991ABFB7B9EF44340F118069E90ADB295EB31DA24CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                • Instruction ID: a4af3b9950ad924dd571dc6b8a69908e426440a2126c95f8aac2c4d759407595
                                • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                • Instruction Fuzzy Hash: 66C1B3362061930EDF2F463AC47447EBAA15AA27F531B076DD8B3CB8D5EF60C5A4D620
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                • Instruction ID: dd146161e5c02c223f2747add91fe183528539f5308975b17d0b28e1ca263954
                                • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                • Instruction Fuzzy Hash: 7BC1B43220A1930EDF6F4639C43447EBAA15EA2BB531B076DD4B3CB8D5EF60D5A4D620
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                • Instruction ID: f555c7629aa72a4cf0233841153320baad5d8074c88f28c5cf5a3a6725799b46
                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                • Instruction Fuzzy Hash: 85C1703220A1930EDF3E8639C47453EBAA15AA2BB531B077DD4B2CB9D5EF20D564D620
                                APIs
                                • DeleteObject.GDI32(00000000), ref: 0034A2FE
                                • DeleteObject.GDI32(00000000), ref: 0034A310
                                • DestroyWindow.USER32 ref: 0034A31E
                                • GetDesktopWindow.USER32 ref: 0034A338
                                • GetWindowRect.USER32(00000000), ref: 0034A33F
                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0034A480
                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 0034A490
                                • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0034A4D8
                                • GetClientRect.USER32(00000000,?), ref: 0034A4E4
                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0034A51E
                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0034A540
                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0034A553
                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0034A55E
                                • GlobalLock.KERNEL32(00000000), ref: 0034A567
                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0034A576
                                • GlobalUnlock.KERNEL32(00000000), ref: 0034A57F
                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0034A586
                                • GlobalFree.KERNEL32(00000000), ref: 0034A591
                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0034A5A3
                                • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,0037D9BC,00000000), ref: 0034A5B9
                                • GlobalFree.KERNEL32(00000000), ref: 0034A5C9
                                • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 0034A5EF
                                • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 0034A60E
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0034A630
                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0034A81D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                • String ID: $AutoIt v3$DISPLAY$static
                                • API String ID: 2211948467-2373415609
                                • Opcode ID: a6af6972bbb9f2dbe737dfc45105b74e70ec6373cc1d8f6d93b556da5b8d5107
                                • Instruction ID: ca0a9c03d48445b7ff8ba779ddbbf5777bfdb020238621e92a5046357d0785d4
                                • Opcode Fuzzy Hash: a6af6972bbb9f2dbe737dfc45105b74e70ec6373cc1d8f6d93b556da5b8d5107
                                • Instruction Fuzzy Hash: BF026D75900118AFDB25DFA4CD89EAEBBB9FF48310F108158F909AB2A1D770AD41CF60
                                APIs
                                • SetTextColor.GDI32(?,00000000), ref: 0035D2DB
                                • GetSysColorBrush.USER32(0000000F), ref: 0035D30C
                                • GetSysColor.USER32(0000000F), ref: 0035D318
                                • SetBkColor.GDI32(?,000000FF), ref: 0035D332
                                • SelectObject.GDI32(?,00000000), ref: 0035D341
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 0035D36C
                                • GetSysColor.USER32(00000010), ref: 0035D374
                                • CreateSolidBrush.GDI32(00000000), ref: 0035D37B
                                • FrameRect.USER32(?,?,00000000), ref: 0035D38A
                                • DeleteObject.GDI32(00000000), ref: 0035D391
                                • InflateRect.USER32(?,000000FE,000000FE), ref: 0035D3DC
                                • FillRect.USER32(?,?,00000000), ref: 0035D40E
                                • GetWindowLongW.USER32(?,000000F0), ref: 0035D439
                                  • Part of subcall function 0035D575: GetSysColor.USER32(00000012), ref: 0035D5AE
                                  • Part of subcall function 0035D575: SetTextColor.GDI32(?,?), ref: 0035D5B2
                                  • Part of subcall function 0035D575: GetSysColorBrush.USER32(0000000F), ref: 0035D5C8
                                  • Part of subcall function 0035D575: GetSysColor.USER32(0000000F), ref: 0035D5D3
                                  • Part of subcall function 0035D575: GetSysColor.USER32(00000011), ref: 0035D5F0
                                  • Part of subcall function 0035D575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0035D5FE
                                  • Part of subcall function 0035D575: SelectObject.GDI32(?,00000000), ref: 0035D60F
                                  • Part of subcall function 0035D575: SetBkColor.GDI32(?,00000000), ref: 0035D618
                                  • Part of subcall function 0035D575: SelectObject.GDI32(?,?), ref: 0035D625
                                  • Part of subcall function 0035D575: InflateRect.USER32(?,000000FF,000000FF), ref: 0035D644
                                  • Part of subcall function 0035D575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0035D65B
                                  • Part of subcall function 0035D575: GetWindowLongW.USER32(00000000,000000F0), ref: 0035D670
                                  • Part of subcall function 0035D575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0035D698
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                • String ID:
                                • API String ID: 3521893082-0
                                • Opcode ID: 99822c6941f501906391ae6873eed9e9f91d57fc5f24bf05a3874d3ff5b71e9c
                                • Instruction ID: c580d64403ea364b4bdab27295556c01d6be7dccb6b0ae97972c3c24b1b6d540
                                • Opcode Fuzzy Hash: 99822c6941f501906391ae6873eed9e9f91d57fc5f24bf05a3874d3ff5b71e9c
                                • Instruction Fuzzy Hash: EA918D72408305AFCB229F64DC08E6B7BBDFF89325F100A19F96A961E0D771D984CB52
                                APIs
                                • DestroyWindow.USER32 ref: 0030B98B
                                • DeleteObject.GDI32(00000000), ref: 0030B9CD
                                • DeleteObject.GDI32(00000000), ref: 0030B9D8
                                • DestroyIcon.USER32(00000000), ref: 0030B9E3
                                • DestroyWindow.USER32(00000000), ref: 0030B9EE
                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 0036D2AA
                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0036D2E3
                                • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 0036D711
                                  • Part of subcall function 0030B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,0030B759,?,00000000,?,?,?,?,0030B72B,00000000,?), ref: 0030BA58
                                • SendMessageW.USER32 ref: 0036D758
                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0036D76F
                                • ImageList_Destroy.COMCTL32(00000000), ref: 0036D785
                                • ImageList_Destroy.COMCTL32(00000000), ref: 0036D790
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                • String ID: 0
                                • API String ID: 464785882-4108050209
                                • Opcode ID: e2896350fb2c2b3f20e32a27279b7a7c1e77a75c9a34ff17b9332d4d03b347ba
                                • Instruction ID: 95f449dc42f76f645a7595bbf1eb4d6d3710ba55ee294f9f1131cff48ad75fd6
                                • Opcode Fuzzy Hash: e2896350fb2c2b3f20e32a27279b7a7c1e77a75c9a34ff17b9332d4d03b347ba
                                • Instruction Fuzzy Hash: 0E12A030A05201DFDB22CF18C894BA9BBF5FF45304F558569E989DB6A6CB31EC81CB91
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0033DBD6
                                • GetDriveTypeW.KERNEL32(?,0038DC54,?,\\.\,0038DC00), ref: 0033DCC3
                                • SetErrorMode.KERNEL32(00000000,0038DC54,?,\\.\,0038DC00), ref: 0033DE29
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorMode$DriveType
                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                • API String ID: 2907320926-4222207086
                                • Opcode ID: 0398eae4a8342560df9f7820d9f3e48dba340337ea9324a213a67905fd24a003
                                • Instruction ID: 64b9b0c91593a26c39d31335dff6e9183c47131a7a23b4b8518d2316e026e0e6
                                • Opcode Fuzzy Hash: 0398eae4a8342560df9f7820d9f3e48dba340337ea9324a213a67905fd24a003
                                • Instruction Fuzzy Hash: A451C230248306ABC313EF10E8D28B9F7A9FF95B44F205A29F0079B6A1CB70D955DB52
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                • API String ID: 1038674560-86951937
                                • Opcode ID: 43806dce027dd3eb782fadf2fd13673c21a1c2ecdf57902e826745605b1c59bf
                                • Instruction ID: dfccd22e20215b72f97e860e596b60a92d1c7fc7f5b80f3a01b2fe0e24a6c948
                                • Opcode Fuzzy Hash: 43806dce027dd3eb782fadf2fd13673c21a1c2ecdf57902e826745605b1c59bf
                                • Instruction Fuzzy Hash: 7681183065020DAACB26BE64CD42FFFB768AF15380F158035FA05AE1CAEB61D965C690
                                APIs
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 0035C788
                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0035C83E
                                • SendMessageW.USER32(?,00001102,00000002,?), ref: 0035C859
                                • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0035CB15
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$Window
                                • String ID: 0
                                • API String ID: 2326795674-4108050209
                                • Opcode ID: 891456c1aaf5f0259e34169acd482c57a75b78fbb4a3ddf6ddaeaf8b1bb266f8
                                • Instruction ID: 9bc0929e11f616e032a08421e1d8d82843588169687b992a41a3b93d07db27ab
                                • Opcode Fuzzy Hash: 891456c1aaf5f0259e34169acd482c57a75b78fbb4a3ddf6ddaeaf8b1bb266f8
                                • Instruction Fuzzy Hash: CAF1D171124301AFD7228F24CC85FAABBE8FF4935AF04162DF989962B1C774C849CB91
                                APIs
                                • CharUpperBuffW.USER32(?,?,0038DC00), ref: 00356449
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: BuffCharUpper
                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                • API String ID: 3964851224-45149045
                                • Opcode ID: 818e169958f64edd557508f3b9c42af910c09d4f8bf3d51beaf83b4ba50fb34b
                                • Instruction ID: 4e083028084b5ef39879a73067051c99660d03a763d14ff7ed2d84c248486964
                                • Opcode Fuzzy Hash: 818e169958f64edd557508f3b9c42af910c09d4f8bf3d51beaf83b4ba50fb34b
                                • Instruction Fuzzy Hash: 4BC1AF342042458BCB06EF10C562E6EB7A9AF95345F50486CFC965F2F2DB21ED4ECB82
                                APIs
                                • GetSysColor.USER32(00000012), ref: 0035D5AE
                                • SetTextColor.GDI32(?,?), ref: 0035D5B2
                                • GetSysColorBrush.USER32(0000000F), ref: 0035D5C8
                                • GetSysColor.USER32(0000000F), ref: 0035D5D3
                                • CreateSolidBrush.GDI32(?), ref: 0035D5D8
                                • GetSysColor.USER32(00000011), ref: 0035D5F0
                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0035D5FE
                                • SelectObject.GDI32(?,00000000), ref: 0035D60F
                                • SetBkColor.GDI32(?,00000000), ref: 0035D618
                                • SelectObject.GDI32(?,?), ref: 0035D625
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 0035D644
                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0035D65B
                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0035D670
                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0035D698
                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0035D6BF
                                • InflateRect.USER32(?,000000FD,000000FD), ref: 0035D6DD
                                • DrawFocusRect.USER32(?,?), ref: 0035D6E8
                                • GetSysColor.USER32(00000011), ref: 0035D6F6
                                • SetTextColor.GDI32(?,00000000), ref: 0035D6FE
                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0035D712
                                • SelectObject.GDI32(?,0035D2A5), ref: 0035D729
                                • DeleteObject.GDI32(?), ref: 0035D734
                                • SelectObject.GDI32(?,?), ref: 0035D73A
                                • DeleteObject.GDI32(?), ref: 0035D73F
                                • SetTextColor.GDI32(?,?), ref: 0035D745
                                • SetBkColor.GDI32(?,?), ref: 0035D74F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                • String ID:
                                • API String ID: 1996641542-0
                                • Opcode ID: d575e22921625428383450b493bfcf67c5530afde6d6b660ce9554d049c32d6e
                                • Instruction ID: 6df5ad8f5d08bbfd0be0619971a44ab292dcc755f5e33f3ecace5c0c6d9aabda
                                • Opcode Fuzzy Hash: d575e22921625428383450b493bfcf67c5530afde6d6b660ce9554d049c32d6e
                                • Instruction Fuzzy Hash: A4514E71900208BFDF229FA4DC48EAE7B79FF09325F114515F919AB2A1D7719A80CF50
                                APIs
                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0035B7B0
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0035B7C1
                                • CharNextW.USER32(0000014E), ref: 0035B7F0
                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 0035B831
                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 0035B847
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0035B858
                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 0035B875
                                • SetWindowTextW.USER32(?,0000014E), ref: 0035B8C7
                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 0035B8DD
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 0035B90E
                                • _memset.LIBCMT ref: 0035B933
                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 0035B97C
                                • _memset.LIBCMT ref: 0035B9DB
                                • SendMessageW.USER32 ref: 0035BA05
                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 0035BA5D
                                • SendMessageW.USER32(?,0000133D,?,?), ref: 0035BB0A
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0035BB2C
                                • GetMenuItemInfoW.USER32(?), ref: 0035BB76
                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0035BBA3
                                • DrawMenuBar.USER32(?), ref: 0035BBB2
                                • SetWindowTextW.USER32(?,0000014E), ref: 0035BBDA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                • String ID: 0
                                • API String ID: 1073566785-4108050209
                                • Opcode ID: 4c694e13b4e69e7ea8c470079d77ae2def4caf968bb85f78c1c846cd21ae07d8
                                • Instruction ID: 45ecc31ff8efe3626f6934ec8a8a8f11c9355d3f165d45c68634f4fe39bacd57
                                • Opcode Fuzzy Hash: 4c694e13b4e69e7ea8c470079d77ae2def4caf968bb85f78c1c846cd21ae07d8
                                • Instruction Fuzzy Hash: DBE16F75900218AFDB229FA5CC85EEEBB7CFF05715F108159FD19AA1A0D7708A85CF60
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$Foreground
                                • String ID: ACTIVE$ALL$CLASS$H+:$HANDLE$INSTANCE$L+:$LAST$P+:$REGEXPCLASS$REGEXPTITLE$T+:$TITLE
                                • API String ID: 62970417-1085210021
                                • Opcode ID: 0f7445c1d3a3a5fba4d1b54597b9ea69f12dc77fff4f867910172af627b63918
                                • Instruction ID: 1796063569a2d6dde0e494414f0068b0b1b126931fa834b476685ca08c0fe2f3
                                • Opcode Fuzzy Hash: 0f7445c1d3a3a5fba4d1b54597b9ea69f12dc77fff4f867910172af627b63918
                                • Instruction Fuzzy Hash: 36D1D3302086469BCB06EF10C4919ABFBB4FF55340F118E2DF556576A1DB30E9AACF91
                                APIs
                                • GetCursorPos.USER32(?), ref: 0035778A
                                • GetDesktopWindow.USER32 ref: 0035779F
                                • GetWindowRect.USER32(00000000), ref: 003577A6
                                • GetWindowLongW.USER32(?,000000F0), ref: 00357808
                                • DestroyWindow.USER32(?), ref: 00357834
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 0035785D
                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0035787B
                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 003578A1
                                • SendMessageW.USER32(?,00000421,?,?), ref: 003578B6
                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 003578C9
                                • IsWindowVisible.USER32(?), ref: 003578E9
                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00357904
                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00357918
                                • GetWindowRect.USER32(?,?), ref: 00357930
                                • MonitorFromPoint.USER32(?,?,00000002), ref: 00357956
                                • GetMonitorInfoW.USER32 ref: 00357970
                                • CopyRect.USER32(?,?), ref: 00357987
                                • SendMessageW.USER32(?,00000412,00000000), ref: 003579F2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                • String ID: ($0$tooltips_class32
                                • API String ID: 698492251-4156429822
                                • Opcode ID: 7534429297ff9e05546fbbc89847fadd074828b2a38294cc771bbd14399aac73
                                • Instruction ID: aaeb666a650a2ee00d34382386de350e8a6d501d7cf62b5c8331270a9b553afa
                                • Opcode Fuzzy Hash: 7534429297ff9e05546fbbc89847fadd074828b2a38294cc771bbd14399aac73
                                • Instruction Fuzzy Hash: 33B1BF71618300AFDB15DF64D849F6ABBE5FF88311F00891DF9999B2A1D770E848CB92
                                APIs
                                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00336CFB
                                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00336D21
                                • _wcscpy.LIBCMT ref: 00336D4F
                                • _wcscmp.LIBCMT ref: 00336D5A
                                • _wcscat.LIBCMT ref: 00336D70
                                • _wcsstr.LIBCMT ref: 00336D7B
                                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00336D97
                                • _wcscat.LIBCMT ref: 00336DE0
                                • _wcscat.LIBCMT ref: 00336DE7
                                • _wcsncpy.LIBCMT ref: 00336E12
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                • API String ID: 699586101-1459072770
                                • Opcode ID: ed91ad9c481e7148779bf05e724886272d823b8d26287d6f7d2a54f238b9826c
                                • Instruction ID: 5c80b1777554b2173e2f93aee5620ceec155e62de5c375f815b1a3ad839c47e5
                                • Opcode Fuzzy Hash: ed91ad9c481e7148779bf05e724886272d823b8d26287d6f7d2a54f238b9826c
                                • Instruction Fuzzy Hash: 7341F471600204BFEB1BBB64CD83EFF777CEF45710F104069F901AA182EAB49A4187A1
                                APIs
                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0030A939
                                • GetSystemMetrics.USER32(00000007), ref: 0030A941
                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0030A96C
                                • GetSystemMetrics.USER32(00000008), ref: 0030A974
                                • GetSystemMetrics.USER32(00000004), ref: 0030A999
                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 0030A9B6
                                • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 0030A9C6
                                • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0030A9F9
                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 0030AA0D
                                • GetClientRect.USER32(00000000,000000FF), ref: 0030AA2B
                                • GetStockObject.GDI32(00000011), ref: 0030AA47
                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 0030AA52
                                  • Part of subcall function 0030B63C: GetCursorPos.USER32(000000FF), ref: 0030B64F
                                  • Part of subcall function 0030B63C: ScreenToClient.USER32(00000000,000000FF), ref: 0030B66C
                                  • Part of subcall function 0030B63C: GetAsyncKeyState.USER32(00000001), ref: 0030B691
                                  • Part of subcall function 0030B63C: GetAsyncKeyState.USER32(00000002), ref: 0030B69F
                                • SetTimer.USER32(00000000,00000000,00000028,0030AB87), ref: 0030AA79
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                • String ID: AutoIt v3 GUI
                                • API String ID: 1458621304-248962490
                                • Opcode ID: c32550f3f233140533ad954ba6d2535f1c6db543f27a65793095182d9cd549c5
                                • Instruction ID: 3b83b4e5dcc3a0e4b8be62e75a5a2ec07c3f11109809f9d448ab6f67aee96950
                                • Opcode Fuzzy Hash: c32550f3f233140533ad954ba6d2535f1c6db543f27a65793095182d9cd549c5
                                • Instruction Fuzzy Hash: 88B16C71A0120AAFDB16DFA8DC55BAE7BB8FF08314F114229FA15A72D0DB74E840CB51
                                APIs
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00353735
                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,0038DC00,00000000,?,00000000,?,?), ref: 003537A3
                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 003537EB
                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00353874
                                • RegCloseKey.ADVAPI32(?), ref: 00353B94
                                • RegCloseKey.ADVAPI32(00000000), ref: 00353BA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Close$ConnectCreateRegistryValue
                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                • API String ID: 536824911-966354055
                                • Opcode ID: 85630ca8567db44d3eea97a90802042073a755dc99746409286204a209b75e82
                                • Instruction ID: cafa83487165c6e19b0f6292ee1550fcf33ea3bd69e12e47aa3033e76125a96a
                                • Opcode Fuzzy Hash: 85630ca8567db44d3eea97a90802042073a755dc99746409286204a209b75e82
                                • Instruction Fuzzy Hash: F00259752046019FCB16EF14C895E2AB7E9FF88760F05846DF98A9B2A1CB30ED55CF81
                                APIs
                                • CharUpperBuffW.USER32(?,?), ref: 00356C56
                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00356D16
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: BuffCharMessageSendUpper
                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                • API String ID: 3974292440-719923060
                                • Opcode ID: 810bdd593799b4300b80276679123527cc506bd3a78d53d125a790da2e06906d
                                • Instruction ID: aa60608fa14ecbf167da71eb4f508ce6cac82f05ebd4248c5925589ae232c60f
                                • Opcode Fuzzy Hash: 810bdd593799b4300b80276679123527cc506bd3a78d53d125a790da2e06906d
                                • Instruction Fuzzy Hash: 30A18B342142459BCB16EF20C952E6AB3A6FF84351F50496DFC969B3E2DB31EC19CB81
                                APIs
                                • GetClassNameW.USER32(?,?,00000100), ref: 0032CF91
                                • __swprintf.LIBCMT ref: 0032D032
                                • _wcscmp.LIBCMT ref: 0032D045
                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0032D09A
                                • _wcscmp.LIBCMT ref: 0032D0D6
                                • GetClassNameW.USER32(?,?,00000400), ref: 0032D10D
                                • GetDlgCtrlID.USER32(?), ref: 0032D15F
                                • GetWindowRect.USER32(?,?), ref: 0032D195
                                • GetParent.USER32(?), ref: 0032D1B3
                                • ScreenToClient.USER32(00000000), ref: 0032D1BA
                                • GetClassNameW.USER32(?,?,00000100), ref: 0032D234
                                • _wcscmp.LIBCMT ref: 0032D248
                                • GetWindowTextW.USER32(?,?,00000400), ref: 0032D26E
                                • _wcscmp.LIBCMT ref: 0032D282
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                • String ID: %s%u
                                • API String ID: 3119225716-679674701
                                • Opcode ID: 2a13e380d72758fae9ce84727a91f94da322b38cf65a77e0a8e10cffe7f4fdc8
                                • Instruction ID: deb5ce93c2c80a6d12a4f2eb15d21b664aacf04fd00d0bbe5e8c19bd0eae3fe5
                                • Opcode Fuzzy Hash: 2a13e380d72758fae9ce84727a91f94da322b38cf65a77e0a8e10cffe7f4fdc8
                                • Instruction Fuzzy Hash: 55A1D031204316EFD71ADF64D884BEAB7A8FF48354F008929FA99D6190DB30EA55CB91
                                APIs
                                • GetClassNameW.USER32(00000008,?,00000400), ref: 0032D8EB
                                • _wcscmp.LIBCMT ref: 0032D8FC
                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 0032D924
                                • CharUpperBuffW.USER32(?,00000000), ref: 0032D941
                                • _wcscmp.LIBCMT ref: 0032D95F
                                • _wcsstr.LIBCMT ref: 0032D970
                                • GetClassNameW.USER32(00000018,?,00000400), ref: 0032D9A8
                                • _wcscmp.LIBCMT ref: 0032D9B8
                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 0032D9DF
                                • GetClassNameW.USER32(00000018,?,00000400), ref: 0032DA28
                                • _wcscmp.LIBCMT ref: 0032DA38
                                • GetClassNameW.USER32(00000010,?,00000400), ref: 0032DA60
                                • GetWindowRect.USER32(00000004,?), ref: 0032DAC9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                • String ID: @$ThumbnailClass
                                • API String ID: 1788623398-1539354611
                                • Opcode ID: e91affb6429374d900b3ab9cd74c24debd6f29653693103fb1d5d987c5e1b328
                                • Instruction ID: 36ff205c9e2f01650e922bac717f8ae06d3a97472acf6fc1f76a00e1b71e4451
                                • Opcode Fuzzy Hash: e91affb6429374d900b3ab9cd74c24debd6f29653693103fb1d5d987c5e1b328
                                • Instruction Fuzzy Hash: A681F4310083159FDB16DF10E985FAA7BE8FF84754F04846AFD8A9A096DB30DD85CBA1
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                • API String ID: 1038674560-1810252412
                                • Opcode ID: b968cb7edf9ef12dc776d5846c7bdb149dfd2e6be6ca0a6e44bb49b0606af982
                                • Instruction ID: 2f21924029a7f2331f976468f08deb5c47a02c59348cc53d668579f5b3b0b203
                                • Opcode Fuzzy Hash: b968cb7edf9ef12dc776d5846c7bdb149dfd2e6be6ca0a6e44bb49b0606af982
                                • Instruction Fuzzy Hash: 3E31B031644319AADB1AFE58ED43EEEB3B8DF21750F300139F541B50D1EB61AE54CA61
                                APIs
                                • LoadIconW.USER32(00000063), ref: 0032EAB0
                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0032EAC2
                                • SetWindowTextW.USER32(?,?), ref: 0032EAD9
                                • GetDlgItem.USER32(?,000003EA), ref: 0032EAEE
                                • SetWindowTextW.USER32(00000000,?), ref: 0032EAF4
                                • GetDlgItem.USER32(?,000003E9), ref: 0032EB04
                                • SetWindowTextW.USER32(00000000,?), ref: 0032EB0A
                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0032EB2B
                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0032EB45
                                • GetWindowRect.USER32(?,?), ref: 0032EB4E
                                • SetWindowTextW.USER32(?,?), ref: 0032EBB9
                                • GetDesktopWindow.USER32 ref: 0032EBBF
                                • GetWindowRect.USER32(00000000), ref: 0032EBC6
                                • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0032EC12
                                • GetClientRect.USER32(?,?), ref: 0032EC1F
                                • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0032EC44
                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0032EC6F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                • String ID:
                                • API String ID: 3869813825-0
                                • Opcode ID: b4c2a18af3445e5063c9368a5964423190815d65835676f37b8441ef274f932c
                                • Instruction ID: b6664f0e71be9b0fc42092030e3939a9b7bb051000a8b0f096f8f2b51a380cbd
                                • Opcode Fuzzy Hash: b4c2a18af3445e5063c9368a5964423190815d65835676f37b8441ef274f932c
                                • Instruction Fuzzy Hash: 0C515D71900719EFDB22DFA8DD8AF6EBBF9FF04705F014928E586A65A0C774A944CB10
                                APIs
                                • LoadCursorW.USER32(00000000,00007F8A), ref: 003479C6
                                • LoadCursorW.USER32(00000000,00007F00), ref: 003479D1
                                • LoadCursorW.USER32(00000000,00007F03), ref: 003479DC
                                • LoadCursorW.USER32(00000000,00007F8B), ref: 003479E7
                                • LoadCursorW.USER32(00000000,00007F01), ref: 003479F2
                                • LoadCursorW.USER32(00000000,00007F81), ref: 003479FD
                                • LoadCursorW.USER32(00000000,00007F88), ref: 00347A08
                                • LoadCursorW.USER32(00000000,00007F80), ref: 00347A13
                                • LoadCursorW.USER32(00000000,00007F86), ref: 00347A1E
                                • LoadCursorW.USER32(00000000,00007F83), ref: 00347A29
                                • LoadCursorW.USER32(00000000,00007F85), ref: 00347A34
                                • LoadCursorW.USER32(00000000,00007F82), ref: 00347A3F
                                • LoadCursorW.USER32(00000000,00007F84), ref: 00347A4A
                                • LoadCursorW.USER32(00000000,00007F04), ref: 00347A55
                                • LoadCursorW.USER32(00000000,00007F02), ref: 00347A60
                                • LoadCursorW.USER32(00000000,00007F89), ref: 00347A6B
                                • GetCursorInfo.USER32(?), ref: 00347A7B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Cursor$Load$Info
                                • String ID:
                                • API String ID: 2577412497-0
                                • Opcode ID: 4999e9fac59af0d46a220ca1c3cd93015b993c26b16b903142b1396f9ec8cac2
                                • Instruction ID: d4a0518bef873881a261b44e6882643ca9a54a4fcbf1efbbb06cb695383c95db
                                • Opcode Fuzzy Hash: 4999e9fac59af0d46a220ca1c3cd93015b993c26b16b903142b1396f9ec8cac2
                                • Instruction Fuzzy Hash: B23107B1D4831A6ADB119FB68C8995FBFF8FF04750F50452AE50DEB280DB78A5008FA1
                                APIs
                                  • Part of subcall function 0030E968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,002FC8B7,?,00002000,?,?,00000000,?,002F419E,?,?,?,0038DC00), ref: 0030E984
                                  • Part of subcall function 002F660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002F53B1,?,?,002F61FF,?,00000000,00000001,00000000), ref: 002F662F
                                • __wsplitpath.LIBCMT ref: 002FC93E
                                  • Part of subcall function 00311DFC: __wsplitpath_helper.LIBCMT ref: 00311E3C
                                • _wcscpy.LIBCMT ref: 002FC953
                                • _wcscat.LIBCMT ref: 002FC968
                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 002FC978
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 002FCABE
                                  • Part of subcall function 002FB337: _wcscpy.LIBCMT ref: 002FB36F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                • API String ID: 2258743419-1018226102
                                • Opcode ID: 1ceffc1604a5783f637293b77b440ce07960117e0b60ea87d3d932ca9be01f99
                                • Instruction ID: 4c076a9ee00a10cc1e4e36fd7b1e15cb7ac3d89c53bc2a55207d57706d9d1ea8
                                • Opcode Fuzzy Hash: 1ceffc1604a5783f637293b77b440ce07960117e0b60ea87d3d932ca9be01f99
                                • Instruction Fuzzy Hash: E912D0305083499FC726EF24C991AAFFBE4BF89344F10492EF58997291DB30DA59CB52
                                APIs
                                • _memset.LIBCMT ref: 0035CEFB
                                • DestroyWindow.USER32(?,?), ref: 0035CF73
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0035CFF4
                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0035D016
                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0035D025
                                • DestroyWindow.USER32(?), ref: 0035D042
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,002F0000,00000000), ref: 0035D075
                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0035D094
                                • GetDesktopWindow.USER32 ref: 0035D0A9
                                • GetWindowRect.USER32(00000000), ref: 0035D0B0
                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0035D0C2
                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0035D0DA
                                  • Part of subcall function 0030B526: GetWindowLongW.USER32(?,000000EB), ref: 0030B537
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                • String ID: 0$tooltips_class32
                                • API String ID: 3877571568-3619404913
                                • Opcode ID: f520dab44cb0f3ff490b6f55e6cd267087295b7bfdf3687a17c15baa05e94c61
                                • Instruction ID: 306895958bdb4086dc140ba60d63bbb246ee9ce6ea3cc783bfd8d66edd0596fd
                                • Opcode Fuzzy Hash: f520dab44cb0f3ff490b6f55e6cd267087295b7bfdf3687a17c15baa05e94c61
                                • Instruction Fuzzy Hash: D271BB70140305AFD726CF28CC85FA677E9EB88708F54461DFE858B2A1D774E946CB22
                                APIs
                                  • Part of subcall function 0030B34E: GetWindowLongW.USER32(?,000000EB), ref: 0030B35F
                                • DragQueryPoint.SHELL32(?,?), ref: 0035F37A
                                  • Part of subcall function 0035D7DE: ClientToScreen.USER32(?,?), ref: 0035D807
                                  • Part of subcall function 0035D7DE: GetWindowRect.USER32(?,?), ref: 0035D87D
                                  • Part of subcall function 0035D7DE: PtInRect.USER32(?,?,0035ED5A), ref: 0035D88D
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0035F3E3
                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0035F3EE
                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0035F411
                                • _wcscat.LIBCMT ref: 0035F441
                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0035F458
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0035F471
                                • SendMessageW.USER32(?,000000B1,?,?), ref: 0035F488
                                • SendMessageW.USER32(?,000000B1,?,?), ref: 0035F4AA
                                • DragFinish.SHELL32(?), ref: 0035F4B1
                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0035F59C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                • API String ID: 169749273-3440237614
                                • Opcode ID: 7c45ad4a8ea6ff88ee6b9cac1117b7485c5a3c8663a0f746f505292b884f609b
                                • Instruction ID: b9015ca89802d9c091dcdb04311af2681107b2733ce59497e348c55782a5f092
                                • Opcode Fuzzy Hash: 7c45ad4a8ea6ff88ee6b9cac1117b7485c5a3c8663a0f746f505292b884f609b
                                • Instruction Fuzzy Hash: A0616C71008304AFC312EF60CC45EAFBBF8EF89754F500A2DF695961A1DB709649CB52
                                APIs
                                • VariantInit.OLEAUT32(00000000), ref: 0033AB3D
                                • VariantCopy.OLEAUT32(?,?), ref: 0033AB46
                                • VariantClear.OLEAUT32(?), ref: 0033AB52
                                • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 0033AC40
                                • __swprintf.LIBCMT ref: 0033AC70
                                • VarR8FromDec.OLEAUT32(?,?), ref: 0033AC9C
                                • VariantInit.OLEAUT32(?), ref: 0033AD4D
                                • SysFreeString.OLEAUT32(00000016), ref: 0033ADDF
                                • VariantClear.OLEAUT32(?), ref: 0033AE35
                                • VariantClear.OLEAUT32(?), ref: 0033AE44
                                • VariantInit.OLEAUT32(00000000), ref: 0033AE80
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                • String ID: %4d%02d%02d%02d%02d%02d$Default
                                • API String ID: 3730832054-3931177956
                                • Opcode ID: c8c1e8e17c84d2a173ba37d12b375aeb9904a885130cbca5c100b2bbb7669686
                                • Instruction ID: 01b14466abecbb92060b8f8f2cdb29345df9819408a3b6f07ac00f7af0374e93
                                • Opcode Fuzzy Hash: c8c1e8e17c84d2a173ba37d12b375aeb9904a885130cbca5c100b2bbb7669686
                                • Instruction Fuzzy Hash: 34D1F071A00A05DBDF229F65C8C5BBAF7B9FF04700F258065E4859B590DB74EC80DBA2
                                APIs
                                • CharUpperBuffW.USER32(?,?), ref: 003571FC
                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00357247
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: BuffCharMessageSendUpper
                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                • API String ID: 3974292440-4258414348
                                • Opcode ID: 492b27b0b73827beabf9539e1ad48a48d2dff1f8613cf34adc578f0b12bbfdbc
                                • Instruction ID: 57df59c898b7838db438af9c822635032d2eab0424a514f8f6d2def7dc88d775
                                • Opcode Fuzzy Hash: 492b27b0b73827beabf9539e1ad48a48d2dff1f8613cf34adc578f0b12bbfdbc
                                • Instruction Fuzzy Hash: 91916E742087019BCB06EF20D851E6EB7A5AF94350F00486CFD966B7A2DB71ED5ACB81
                                APIs
                                • EnumChildWindows.USER32(?,0032CF50), ref: 0032CE90
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ChildEnumWindows
                                • String ID: 4+:$CLASS$CLASSNN$H+:$INSTANCE$L+:$NAME$P+:$REGEXPCLASS$T+:$TEXT
                                • API String ID: 3555792229-992007435
                                • Opcode ID: e07b45ce37e5e497d00293bba89fe58825f4e46776320c3996197b5fb4ff53f0
                                • Instruction ID: 48fc6b3ac7fb863e51a33b367426c19db39b0c71644c816311b488ba6c94c45e
                                • Opcode Fuzzy Hash: e07b45ce37e5e497d00293bba89fe58825f4e46776320c3996197b5fb4ff53f0
                                • Instruction Fuzzy Hash: DD91C53061021AABCB1ADF60D481BEEFB75FF04340F519529E949B7191DF31699ACBE0
                                APIs
                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0035E5AB
                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,0035BEAF), ref: 0035E607
                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0035E647
                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0035E68C
                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0035E6C3
                                • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,0035BEAF), ref: 0035E6CF
                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0035E6DF
                                • DestroyIcon.USER32(?,?,?,?,?,0035BEAF), ref: 0035E6EE
                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0035E70B
                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0035E717
                                  • Part of subcall function 00310FA7: __wcsicmp_l.LIBCMT ref: 00311030
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                • String ID: .dll$.exe$.icl
                                • API String ID: 1212759294-1154884017
                                • Opcode ID: 2d65735dd0e7cb50d25987cfed2c6ca920e3ee5469809dfe47647b713893b4c0
                                • Instruction ID: abdda2088b88eca77ae0928085243138b7f437d9c4c94dbd2c27179d47ae256e
                                • Opcode Fuzzy Hash: 2d65735dd0e7cb50d25987cfed2c6ca920e3ee5469809dfe47647b713893b4c0
                                • Instruction Fuzzy Hash: 7361C271500215BAEB2ADF64CC46FFE77ACBF18761F104515F915EA0E0EBB09A84CBA0
                                APIs
                                  • Part of subcall function 002F936C: __swprintf.LIBCMT ref: 002F93AB
                                  • Part of subcall function 002F936C: __itow.LIBCMT ref: 002F93DF
                                • CharLowerBuffW.USER32(?,?), ref: 0033D292
                                • GetDriveTypeW.KERNEL32 ref: 0033D2DF
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0033D327
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0033D35E
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0033D38C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                • API String ID: 1148790751-4113822522
                                • Opcode ID: 302ea18a45769a7048066a00c0b2cd354be5448e711a26cd911a47b7fb5b7720
                                • Instruction ID: 6de08fa223ea34d779400565cffb958979f978812fec3e66b28c422ce3859247
                                • Opcode Fuzzy Hash: 302ea18a45769a7048066a00c0b2cd354be5448e711a26cd911a47b7fb5b7720
                                • Instruction Fuzzy Hash: 06515C756143089FC701EF10D99196AB3F8EF88758F10486CF98A672A1DB31EE05CF42
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00363973,00000016,0000138C,00000016,?,00000016,0038DDB4,00000000,?), ref: 003326F1
                                • LoadStringW.USER32(00000000,?,00363973,00000016), ref: 003326FA
                                • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00363973,00000016,0000138C,00000016,?,00000016,0038DDB4,00000000,?,00000016), ref: 0033271C
                                • LoadStringW.USER32(00000000,?,00363973,00000016), ref: 0033271F
                                • __swprintf.LIBCMT ref: 0033276F
                                • __swprintf.LIBCMT ref: 00332780
                                • _wprintf.LIBCMT ref: 00332829
                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00332840
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                • API String ID: 618562835-2268648507
                                • Opcode ID: 4480b853dd7b57b689b26b5be92c702ce2ac4ee0decfad843e0f93b7dccfd01e
                                • Instruction ID: 92a2375483fa7a0242c9badf7d67085b41ec7aa6d6dee4b84062bbc82ea525d6
                                • Opcode Fuzzy Hash: 4480b853dd7b57b689b26b5be92c702ce2ac4ee0decfad843e0f93b7dccfd01e
                                • Instruction Fuzzy Hash: 14410B7280021DAACB16FBD0DE86EFFB778AF19384F100065B60576092EA746F59CE60
                                APIs
                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0033D0D8
                                • __swprintf.LIBCMT ref: 0033D0FA
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0033D137
                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0033D15C
                                • _memset.LIBCMT ref: 0033D17B
                                • _wcsncpy.LIBCMT ref: 0033D1B7
                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0033D1EC
                                • CloseHandle.KERNEL32(00000000), ref: 0033D1F7
                                • RemoveDirectoryW.KERNEL32(?), ref: 0033D200
                                • CloseHandle.KERNEL32(00000000), ref: 0033D20A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                • String ID: :$\$\??\%s
                                • API String ID: 2733774712-3457252023
                                • Opcode ID: 0742e015c24c1725484402f842a9fb6f78ad843d38843d675f5d4942397fb65f
                                • Instruction ID: 7b95731bde387331bb5857f660d68cfada3f6b28e2d0494630342c75eff060b0
                                • Opcode Fuzzy Hash: 0742e015c24c1725484402f842a9fb6f78ad843d38843d675f5d4942397fb65f
                                • Instruction Fuzzy Hash: 1631C4B6900109ABDB22DFA0EC89FEB77BDEF89700F1041B6F509D6161E770D6858B24
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,0035BEF4,?,?), ref: 0035E754
                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0035BEF4,?,?,00000000,?), ref: 0035E76B
                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0035BEF4,?,?,00000000,?), ref: 0035E776
                                • CloseHandle.KERNEL32(00000000,?,?,?,?,0035BEF4,?,?,00000000,?), ref: 0035E783
                                • GlobalLock.KERNEL32(00000000), ref: 0035E78C
                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,0035BEF4,?,?,00000000,?), ref: 0035E79B
                                • GlobalUnlock.KERNEL32(00000000), ref: 0035E7A4
                                • CloseHandle.KERNEL32(00000000,?,?,?,?,0035BEF4,?,?,00000000,?), ref: 0035E7AB
                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0035BEF4,?,?,00000000,?), ref: 0035E7BC
                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,0037D9BC,?), ref: 0035E7D5
                                • GlobalFree.KERNEL32(00000000), ref: 0035E7E5
                                • GetObjectW.GDI32(00000000,00000018,?), ref: 0035E809
                                • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0035E834
                                • DeleteObject.GDI32(00000000), ref: 0035E85C
                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0035E872
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                • String ID:
                                • API String ID: 3840717409-0
                                • Opcode ID: 3b24a73a88c9020d4014b70177c178b2383ca17fc2ecfd4abbf070d62d7bbdbb
                                • Instruction ID: d360bb51f30ce9958cef7ec7ab0505e4c43471257bb7161edf37dcf809451eae
                                • Opcode Fuzzy Hash: 3b24a73a88c9020d4014b70177c178b2383ca17fc2ecfd4abbf070d62d7bbdbb
                                • Instruction Fuzzy Hash: 90415B75600204FFDB229F65DC88EAA7BBDEF89B11F108458F909E7260C7319E85DB60
                                APIs
                                • __wsplitpath.LIBCMT ref: 0034076F
                                • _wcscat.LIBCMT ref: 00340787
                                • _wcscat.LIBCMT ref: 00340799
                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003407AE
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 003407C2
                                • GetFileAttributesW.KERNEL32(?), ref: 003407DA
                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 003407F4
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00340806
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                • String ID: *.*
                                • API String ID: 34673085-438819550
                                • Opcode ID: ce2e6ca238b4006d50a5d6550658a5f0782a55bc89945a0ea6269f67c13985ed
                                • Instruction ID: 792541fb840b799cc5f53e6675f67e1aa9ca15e3576ec82ceb752f7478c464fd
                                • Opcode Fuzzy Hash: ce2e6ca238b4006d50a5d6550658a5f0782a55bc89945a0ea6269f67c13985ed
                                • Instruction Fuzzy Hash: 5081A2716043059FCB29DF64C44596EB7E8FF88300F15482EFA8ADB251E734E9948F92
                                APIs
                                  • Part of subcall function 0030B34E: GetWindowLongW.USER32(?,000000EB), ref: 0030B35F
                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0035EF3B
                                • GetFocus.USER32 ref: 0035EF4B
                                • GetDlgCtrlID.USER32(00000000), ref: 0035EF56
                                • _memset.LIBCMT ref: 0035F081
                                • GetMenuItemInfoW.USER32 ref: 0035F0AC
                                • GetMenuItemCount.USER32(00000000), ref: 0035F0CC
                                • GetMenuItemID.USER32(?,00000000), ref: 0035F0DF
                                • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 0035F113
                                • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 0035F15B
                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0035F193
                                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0035F1C8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                • String ID: 0
                                • API String ID: 1296962147-4108050209
                                • Opcode ID: 3c8027fe2112f1609461cb3ec2fc2d9442ff3bfa48cf0e662266c7d2c4bae1ce
                                • Instruction ID: 552be6e90f8c9aa259f9c14c5fbab6496a7a8e7a3c2a52cefb5f75e06a894af1
                                • Opcode Fuzzy Hash: 3c8027fe2112f1609461cb3ec2fc2d9442ff3bfa48cf0e662266c7d2c4bae1ce
                                • Instruction Fuzzy Hash: 41817870508301AFD726CF14C884E6ABBE9FF88315F15492EFD99972A1D730DA49CB92
                                APIs
                                  • Part of subcall function 0032ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0032ABD7
                                  • Part of subcall function 0032ABBB: GetLastError.KERNEL32(?,0032A69F,?,?,?), ref: 0032ABE1
                                  • Part of subcall function 0032ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0032A69F,?,?,?), ref: 0032ABF0
                                  • Part of subcall function 0032ABBB: HeapAlloc.KERNEL32(00000000,?,0032A69F,?,?,?), ref: 0032ABF7
                                  • Part of subcall function 0032ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0032AC0E
                                  • Part of subcall function 0032AC56: GetProcessHeap.KERNEL32(00000008,0032A6B5,00000000,00000000,?,0032A6B5,?), ref: 0032AC62
                                  • Part of subcall function 0032AC56: HeapAlloc.KERNEL32(00000000,?,0032A6B5,?), ref: 0032AC69
                                  • Part of subcall function 0032AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0032A6B5,?), ref: 0032AC7A
                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0032A8CB
                                • _memset.LIBCMT ref: 0032A8E0
                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0032A8FF
                                • GetLengthSid.ADVAPI32(?), ref: 0032A910
                                • GetAce.ADVAPI32(?,00000000,?), ref: 0032A94D
                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0032A969
                                • GetLengthSid.ADVAPI32(?), ref: 0032A986
                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0032A995
                                • HeapAlloc.KERNEL32(00000000), ref: 0032A99C
                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0032A9BD
                                • CopySid.ADVAPI32(00000000), ref: 0032A9C4
                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0032A9F5
                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0032AA1B
                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0032AA2F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                • String ID:
                                • API String ID: 3996160137-0
                                • Opcode ID: 19541e055134f4c71d62e71089268c8c0ba536012de090b0ec61f15fc71b0f2f
                                • Instruction ID: d447b16618dd8b79cd5e27bb66ba916b71c560a7bf228b3efdfda2cc50d99a2e
                                • Opcode Fuzzy Hash: 19541e055134f4c71d62e71089268c8c0ba536012de090b0ec61f15fc71b0f2f
                                • Instruction Fuzzy Hash: 3C518EB1900619AFDF12DF90EC84EEEBBB9FF04300F048129F915AB290DB309A45CB61
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: LoadString__swprintf_wprintf
                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                • API String ID: 2889450990-2391861430
                                • Opcode ID: 258fade7638eac5f19a6c4da7c411438b365ad442936b5d3aacfed9abfadff69
                                • Instruction ID: ae76bd7c41d990c1921885a866ec5c99357b054a09952321c275483105bc8df7
                                • Opcode Fuzzy Hash: 258fade7638eac5f19a6c4da7c411438b365ad442936b5d3aacfed9abfadff69
                                • Instruction Fuzzy Hash: 80514C3181011DAACB16FBA0CD86EEFF778AF09344F100165F605761A2EB716E69DF61
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: LoadString__swprintf_wprintf
                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                • API String ID: 2889450990-3420473620
                                • Opcode ID: 1a1cc24ada96f5565f00096b1bfb311ffd6ab4087fb8c00f9b10ae83ae3826b8
                                • Instruction ID: 8be8145a5312cc1027d7cb291bef6128233e53b739b4b4e4c9d22bdbfa4e3ba6
                                • Opcode Fuzzy Hash: 1a1cc24ada96f5565f00096b1bfb311ffd6ab4087fb8c00f9b10ae83ae3826b8
                                • Instruction Fuzzy Hash: 2D517E3181011DAACB16FBA0CD86EEFF778AF08344F100165F60576092EB756E69DF61
                                APIs
                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00352BB5,?,?), ref: 00353C1D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: BuffCharUpper
                                • String ID: $E:$HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                • API String ID: 3964851224-2638670893
                                • Opcode ID: d9036682a24c99405bec0d53dfad9b4d159085f69580868df53cdc64917c5ba6
                                • Instruction ID: d63e75e807b7586fc313210ff0af4ac6373b10e7c4b09f9283f1dd73ab62c586
                                • Opcode Fuzzy Hash: d9036682a24c99405bec0d53dfad9b4d159085f69580868df53cdc64917c5ba6
                                • Instruction Fuzzy Hash: E5414F3461024A8BDF07EF14D851AEA73B5EF53381F514828EC551B2B2EBB19E1ECB50
                                APIs
                                • _memset.LIBCMT ref: 003355D7
                                • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00335664
                                • GetMenuItemCount.USER32(003B1708), ref: 003356ED
                                • DeleteMenu.USER32(003B1708,00000005,00000000,000000F5,?,?), ref: 0033577D
                                • DeleteMenu.USER32(003B1708,00000004,00000000), ref: 00335785
                                • DeleteMenu.USER32(003B1708,00000006,00000000), ref: 0033578D
                                • DeleteMenu.USER32(003B1708,00000003,00000000), ref: 00335795
                                • GetMenuItemCount.USER32(003B1708), ref: 0033579D
                                • SetMenuItemInfoW.USER32(003B1708,00000004,00000000,00000030), ref: 003357D3
                                • GetCursorPos.USER32(?), ref: 003357DD
                                • SetForegroundWindow.USER32(00000000), ref: 003357E6
                                • TrackPopupMenuEx.USER32(003B1708,00000000,?,00000000,00000000,00000000), ref: 003357F9
                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00335805
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                • String ID:
                                • API String ID: 3993528054-0
                                • Opcode ID: 07fcb32232aba1ec2e4eea71b4b3965c5ace985fbd42c643de9a7ba39a1cdfdc
                                • Instruction ID: 52e10235e31e9c6f26ce5a0d444fe0ad125123fa341f3d44069c798e172d020e
                                • Opcode Fuzzy Hash: 07fcb32232aba1ec2e4eea71b4b3965c5ace985fbd42c643de9a7ba39a1cdfdc
                                • Instruction Fuzzy Hash: AB710670640605BFEB229F55DCCAFAABF69FF00368F644205F618AA1E0C7716C50DB90
                                APIs
                                • _memset.LIBCMT ref: 0032A1DC
                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 0032A211
                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0032A22D
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 0032A249
                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 0032A273
                                • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0032A29B
                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0032A2A6
                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0032A2AB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                • API String ID: 1687751970-22481851
                                • Opcode ID: 064fcbc95c82042ff159a34f866eac335b06b69a1f5b26a18cea0e147de32e1b
                                • Instruction ID: 162369198c967c33622f87da1d23f4cc5ae34f059d5332931c713bf331d78f96
                                • Opcode Fuzzy Hash: 064fcbc95c82042ff159a34f866eac335b06b69a1f5b26a18cea0e147de32e1b
                                • Instruction Fuzzy Hash: 2B410676C1062DABDB22EBA4EC85DEEB778FF04340F014029F905A7161EA34AE55CF90
                                APIs
                                • __swprintf.LIBCMT ref: 003367FD
                                • __swprintf.LIBCMT ref: 0033680A
                                  • Part of subcall function 0031172B: __woutput_l.LIBCMT ref: 00311784
                                • FindResourceW.KERNEL32(?,?,0000000E), ref: 00336834
                                • LoadResource.KERNEL32(?,00000000), ref: 00336840
                                • LockResource.KERNEL32(00000000), ref: 0033684D
                                • FindResourceW.KERNEL32(?,?,00000003), ref: 0033686D
                                • LoadResource.KERNEL32(?,00000000), ref: 0033687F
                                • SizeofResource.KERNEL32(?,00000000), ref: 0033688E
                                • LockResource.KERNEL32(?), ref: 0033689A
                                • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 003368F9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                • String ID: 5:
                                • API String ID: 1433390588-2148306840
                                • Opcode ID: 20055a7e16d7e6676f214ccf557a0d58f9e18f49b055c959350274745b525db8
                                • Instruction ID: cd3a29c760a0ea533e941cd232ac9b6ce19d1db3cf6ce801245f7c153e91f135
                                • Opcode Fuzzy Hash: 20055a7e16d7e6676f214ccf557a0d58f9e18f49b055c959350274745b525db8
                                • Instruction Fuzzy Hash: FB318E7190021ABFDB129F60DD96ABEBBBCEF08340F018825F906E6151E734D952DBA0
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,003636F4,00000010,?,Bad directive syntax error,0038DC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 003325D6
                                • LoadStringW.USER32(00000000,?,003636F4,00000010), ref: 003325DD
                                • _wprintf.LIBCMT ref: 00332610
                                • __swprintf.LIBCMT ref: 00332632
                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 003326A1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                • API String ID: 1080873982-4153970271
                                • Opcode ID: f308e443bbdee983284f8cd661f963259a59b243fa2e3357bef841ae9d5db9ee
                                • Instruction ID: eaeeba974d436789d489cc621b7e1bfcaa101471af76c6ca36f0f34d8ec012d0
                                • Opcode Fuzzy Hash: f308e443bbdee983284f8cd661f963259a59b243fa2e3357bef841ae9d5db9ee
                                • Instruction Fuzzy Hash: 0A215E3191021EAFCF16AF90CC4AEFEB739FF19344F000465F605660A2DA71A664DF50
                                APIs
                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00337B42
                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00337B58
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00337B69
                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00337B7B
                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00337B8C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: SendString
                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                • API String ID: 890592661-1007645807
                                • Opcode ID: 28bad8c67e97c413835d6be8754534a39a3a0ca3c92ba5557ff9442ee934bda1
                                • Instruction ID: ecf27f2c5b6d13824ac26aa70f94616ed053436d514f074002908a80c3262e86
                                • Opcode Fuzzy Hash: 28bad8c67e97c413835d6be8754534a39a3a0ca3c92ba5557ff9442ee934bda1
                                • Instruction Fuzzy Hash: BA11C4E065026D79D721B761CC8ADFFFABCEBD2B50F000429B511A20C1DA601A44CAB0
                                APIs
                                • timeGetTime.WINMM ref: 00337794
                                  • Part of subcall function 0030DC38: timeGetTime.WINMM(?,75A4B400,003658AB), ref: 0030DC3C
                                • Sleep.KERNEL32(0000000A), ref: 003377C0
                                • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 003377E4
                                • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00337806
                                • SetActiveWindow.USER32 ref: 00337825
                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00337833
                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00337852
                                • Sleep.KERNEL32(000000FA), ref: 0033785D
                                • IsWindow.USER32 ref: 00337869
                                • EndDialog.USER32(00000000), ref: 0033787A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                • String ID: BUTTON
                                • API String ID: 1194449130-3405671355
                                • Opcode ID: 7f8dac5c91bf3208a189b5595808754585d1781fee061d9ee6b8aba213cf818a
                                • Instruction ID: 8c2ee280a01b65c357f1014c2bd2383f90a94247416cfcdc7fb45ed88b0f9542
                                • Opcode Fuzzy Hash: 7f8dac5c91bf3208a189b5595808754585d1781fee061d9ee6b8aba213cf818a
                                • Instruction Fuzzy Hash: 18214DB4204209AFE7235F60ECD9B763FBDFB45359F400528F64A9A162CB719D40DB20
                                APIs
                                  • Part of subcall function 002F936C: __swprintf.LIBCMT ref: 002F93AB
                                  • Part of subcall function 002F936C: __itow.LIBCMT ref: 002F93DF
                                • CoInitialize.OLE32(00000000), ref: 0034034B
                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 003403DE
                                • SHGetDesktopFolder.SHELL32(?), ref: 003403F2
                                • CoCreateInstance.OLE32(0037DA8C,00000000,00000001,003A3CF8,?), ref: 0034043E
                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 003404AD
                                • CoTaskMemFree.OLE32(?,?), ref: 00340505
                                • _memset.LIBCMT ref: 00340542
                                • SHBrowseForFolderW.SHELL32(?), ref: 0034057E
                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 003405A1
                                • CoTaskMemFree.OLE32(00000000), ref: 003405A8
                                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 003405DF
                                • CoUninitialize.OLE32(00000001,00000000), ref: 003405E1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                • String ID:
                                • API String ID: 1246142700-0
                                • Opcode ID: 04b51fce48d6bec5bcf1e1d66614e4e92e36eef51ca2044dbac5515b9dbd4d48
                                • Instruction ID: 3ee8c69917adbfb3913e1281d2abaa213e13cc837beba1f2cf9dcf4cf278d1cf
                                • Opcode Fuzzy Hash: 04b51fce48d6bec5bcf1e1d66614e4e92e36eef51ca2044dbac5515b9dbd4d48
                                • Instruction Fuzzy Hash: A7B1C675A10209AFDB15DFA4C889DAEBBB9EF49304F1484A9E909EB251DB30ED41CF50
                                APIs
                                • GetKeyboardState.USER32(?), ref: 00332ED6
                                • SetKeyboardState.USER32(?), ref: 00332F41
                                • GetAsyncKeyState.USER32(000000A0), ref: 00332F61
                                • GetKeyState.USER32(000000A0), ref: 00332F78
                                • GetAsyncKeyState.USER32(000000A1), ref: 00332FA7
                                • GetKeyState.USER32(000000A1), ref: 00332FB8
                                • GetAsyncKeyState.USER32(00000011), ref: 00332FE4
                                • GetKeyState.USER32(00000011), ref: 00332FF2
                                • GetAsyncKeyState.USER32(00000012), ref: 0033301B
                                • GetKeyState.USER32(00000012), ref: 00333029
                                • GetAsyncKeyState.USER32(0000005B), ref: 00333052
                                • GetKeyState.USER32(0000005B), ref: 00333060
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: State$Async$Keyboard
                                • String ID:
                                • API String ID: 541375521-0
                                • Opcode ID: 92b97efc477b48d8c551696dbaca78d6aae49fada66a205166ded8760e353607
                                • Instruction ID: 93dac08ffbd0f5addcc2bc5be60da27fbc3ec497a207eed007387fc3f8d564e7
                                • Opcode Fuzzy Hash: 92b97efc477b48d8c551696dbaca78d6aae49fada66a205166ded8760e353607
                                • Instruction Fuzzy Hash: 1951B87090879429FB37DBA488917EBBFF49F12340F09859DD5C25A1C2DA549B8CC7A2
                                APIs
                                • GetDlgItem.USER32(?,00000001), ref: 0032ED1E
                                • GetWindowRect.USER32(00000000,?), ref: 0032ED30
                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0032ED8E
                                • GetDlgItem.USER32(?,00000002), ref: 0032ED99
                                • GetWindowRect.USER32(00000000,?), ref: 0032EDAB
                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0032EE01
                                • GetDlgItem.USER32(?,000003E9), ref: 0032EE0F
                                • GetWindowRect.USER32(00000000,?), ref: 0032EE20
                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0032EE63
                                • GetDlgItem.USER32(?,000003EA), ref: 0032EE71
                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0032EE8E
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0032EE9B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$ItemMoveRect$Invalidate
                                • String ID:
                                • API String ID: 3096461208-0
                                • Opcode ID: 1ee2a620557a9d1272fb451abe0c7fdf85dc06310fcf70ce9394965a0e0cd98e
                                • Instruction ID: e2e85962774a6138d7796f1271ad0a8016f92a8dba4a31d9bde637d1f04757d3
                                • Opcode Fuzzy Hash: 1ee2a620557a9d1272fb451abe0c7fdf85dc06310fcf70ce9394965a0e0cd98e
                                • Instruction Fuzzy Hash: 87513FB1B00205AFDB19DF68DD86AAEBBBAFF88710F55812DF519E7290D7709D408B10
                                APIs
                                  • Part of subcall function 0030B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,0030B759,?,00000000,?,?,?,?,0030B72B,00000000,?), ref: 0030BA58
                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,0030B72B), ref: 0030B7F6
                                • KillTimer.USER32(00000000,?,00000000,?,?,?,?,0030B72B,00000000,?,?,0030B2EF,?,?), ref: 0030B88D
                                • DestroyAcceleratorTable.USER32(00000000), ref: 0036D8A6
                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0030B72B,00000000,?,?,0030B2EF,?,?), ref: 0036D8D7
                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0030B72B,00000000,?,?,0030B2EF,?,?), ref: 0036D8EE
                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0030B72B,00000000,?,?,0030B2EF,?,?), ref: 0036D90A
                                • DeleteObject.GDI32(00000000), ref: 0036D91C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                • String ID:
                                • API String ID: 641708696-0
                                • Opcode ID: ce9cc5718bd4f7c706d9c13c121d6b317edacdcf7c9b0020a051ee2211a4b91e
                                • Instruction ID: 65d013825d571278ee74039978f94338e41a9cb99bbd4b077424b6e9d021be08
                                • Opcode Fuzzy Hash: ce9cc5718bd4f7c706d9c13c121d6b317edacdcf7c9b0020a051ee2211a4b91e
                                • Instruction Fuzzy Hash: 89618C30A02600DFDB379F18D9A8B25B7F9FF94715F25851DE5468AAB4C770A890DF40
                                APIs
                                  • Part of subcall function 0030B526: GetWindowLongW.USER32(?,000000EB), ref: 0030B537
                                • GetSysColor.USER32(0000000F), ref: 0030B438
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ColorLongWindow
                                • String ID:
                                • API String ID: 259745315-0
                                • Opcode ID: 8965d80c97c5b316da265247701a3b86e73f0f63e6bec6777ef17ba88dca5dcf
                                • Instruction ID: 8299c4c591bec5ffbca04111ba24496cb46b3fc6c23acaaf43432e11ea6d2e25
                                • Opcode Fuzzy Hash: 8965d80c97c5b316da265247701a3b86e73f0f63e6bec6777ef17ba88dca5dcf
                                • Instruction Fuzzy Hash: D141C130102104AFDB235F29DC99BB97B69AF06730F598261FD698E1E6D7318D82C721
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                • String ID:
                                • API String ID: 136442275-0
                                • Opcode ID: a165d3f5e92803f89b54d0804694e223f87c97dfb1e5844280abeff5b40a84fc
                                • Instruction ID: b83017858b5323c0c2381d3ed4d1ed3214e7ba6fe4cf5bd87f231502297d85e0
                                • Opcode Fuzzy Hash: a165d3f5e92803f89b54d0804694e223f87c97dfb1e5844280abeff5b40a84fc
                                • Instruction Fuzzy Hash: D641217684511CAECF6ADB90DC86DDBB3BCEB48300F1041E6F659A6051EE70A7E58F50
                                APIs
                                • CharLowerBuffW.USER32(0038DC00,0038DC00,0038DC00), ref: 0033D7CE
                                • GetDriveTypeW.KERNEL32(?,003A3A70,00000061), ref: 0033D898
                                • _wcscpy.LIBCMT ref: 0033D8C2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: BuffCharDriveLowerType_wcscpy
                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                • API String ID: 2820617543-1000479233
                                • Opcode ID: 7eb99d181dc312295aababf11b3c856471dfe27d3dc14d36865de981b63bf27d
                                • Instruction ID: 72e0d307a3ed92c54e331b41c57c6a84324a001af0326c70e1dcd12d5cd08bcd
                                • Opcode Fuzzy Hash: 7eb99d181dc312295aababf11b3c856471dfe27d3dc14d36865de981b63bf27d
                                • Instruction Fuzzy Hash: 26519F35204304AFC706EF14E8D2AAEB7A5EF85314F10882DF59A5B2A2DB31ED15CB42
                                APIs
                                • __swprintf.LIBCMT ref: 002F93AB
                                • __itow.LIBCMT ref: 002F93DF
                                  • Part of subcall function 00311557: _xtow@16.LIBCMT ref: 00311578
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __itow__swprintf_xtow@16
                                • String ID: %.15g$0x%p$False$True
                                • API String ID: 1502193981-2263619337
                                • Opcode ID: 97bc6943fa53da0492b309d1fc7ed0901cfb0c1681ed431eaabb35a91006ac31
                                • Instruction ID: daceb3e93803aa2ae707c4d70ae987cac6a0d5f828b0eef6f122a33b86972d90
                                • Opcode Fuzzy Hash: 97bc6943fa53da0492b309d1fc7ed0901cfb0c1681ed431eaabb35a91006ac31
                                • Instruction Fuzzy Hash: 5B41D771910209AFDB25EF74D941FB9B7E8EB48340F2044BAE649D72C5EA719991CB10
                                APIs
                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0035A259
                                • CreateCompatibleDC.GDI32(00000000), ref: 0035A260
                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 0035A273
                                • SelectObject.GDI32(00000000,00000000), ref: 0035A27B
                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0035A286
                                • DeleteDC.GDI32(00000000), ref: 0035A28F
                                • GetWindowLongW.USER32(?,000000EC), ref: 0035A299
                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 0035A2AD
                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0035A2B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                • String ID: static
                                • API String ID: 2559357485-2160076837
                                • Opcode ID: cd0a213d3a737581c11c6211ea0e572be1ca0263573e3f6c901742e6948c4612
                                • Instruction ID: b85cd550b4f6fba91d683dc797daf38af7171856cfcb60fd1e0b458631c2a956
                                • Opcode Fuzzy Hash: cd0a213d3a737581c11c6211ea0e572be1ca0263573e3f6c901742e6948c4612
                                • Instruction Fuzzy Hash: C8316E31100519ABDF225FA4DC4AFEA3B7DFF09761F110314FA19A60A0C736D855DBA5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                • String ID: 0.0.0.0
                                • API String ID: 2620052-3771769585
                                • Opcode ID: 0418d843c66ebd679bd903590fe657a5692e1d83f6ba91af98610897fdc38b80
                                • Instruction ID: 68123cefc4992ba4cf2bcfbf1536c1266c4184dd327b0e758dc9f86085e121bb
                                • Opcode Fuzzy Hash: 0418d843c66ebd679bd903590fe657a5692e1d83f6ba91af98610897fdc38b80
                                • Instruction Fuzzy Hash: 2711B471504219BFCB2BAB60AC8AEEA77BCEF45710F014065F159AA091EFB0DAC58B50
                                APIs
                                • _memset.LIBCMT ref: 00315047
                                  • Part of subcall function 00317C0E: __getptd_noexit.LIBCMT ref: 00317C0E
                                • __gmtime64_s.LIBCMT ref: 003150E0
                                • __gmtime64_s.LIBCMT ref: 00315116
                                • __gmtime64_s.LIBCMT ref: 00315133
                                • __allrem.LIBCMT ref: 00315189
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003151A5
                                • __allrem.LIBCMT ref: 003151BC
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003151DA
                                • __allrem.LIBCMT ref: 003151F1
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0031520F
                                • __invoke_watson.LIBCMT ref: 00315280
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                • String ID:
                                • API String ID: 384356119-0
                                • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                • Instruction ID: 1841de82609ba3c4b4604c239e7cdf4fabdcba9f09ae3e0648c29ca0c9a97b16
                                • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                • Instruction Fuzzy Hash: 32710672A00B16EBD71A9F68CC41BEA73A8BF9C364F144639F510DA681E770D9C08BD0
                                APIs
                                • _memset.LIBCMT ref: 00334DF8
                                • GetMenuItemInfoW.USER32(003B1708,000000FF,00000000,00000030), ref: 00334E59
                                • SetMenuItemInfoW.USER32(003B1708,00000004,00000000,00000030), ref: 00334E8F
                                • Sleep.KERNEL32(000001F4), ref: 00334EA1
                                • GetMenuItemCount.USER32(?), ref: 00334EE5
                                • GetMenuItemID.USER32(?,00000000), ref: 00334F01
                                • GetMenuItemID.USER32(?,-00000001), ref: 00334F2B
                                • GetMenuItemID.USER32(?,?), ref: 00334F70
                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00334FB6
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00334FCA
                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00334FEB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                • String ID:
                                • API String ID: 4176008265-0
                                • Opcode ID: b0f667b97a3fdcf10ee6b033c21cf0a405503aa4205be88e124d1584e996df24
                                • Instruction ID: fba37519aa432d41c67a3233d1eab203413ea7224f56a55fba731177cfc5ff3b
                                • Opcode Fuzzy Hash: b0f667b97a3fdcf10ee6b033c21cf0a405503aa4205be88e124d1584e996df24
                                • Instruction Fuzzy Hash: 0E618C71900249AFDB22DFA4D8C8EAE7BB8FF45318F190159F946A7251D731BD45CB20
                                APIs
                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00359C98
                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00359C9B
                                • GetWindowLongW.USER32(?,000000F0), ref: 00359CBF
                                • _memset.LIBCMT ref: 00359CD0
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00359CE2
                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00359D5A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$LongWindow_memset
                                • String ID:
                                • API String ID: 830647256-0
                                • Opcode ID: 8fa2531153daff4a14c4b84e9e3f1700182c9d585c71bb68f103b19ee8e959f5
                                • Instruction ID: b406e872c7e427e3ea87d398142d0125e29e23a83b8c5ec3a8e11acf30482fa0
                                • Opcode Fuzzy Hash: 8fa2531153daff4a14c4b84e9e3f1700182c9d585c71bb68f103b19ee8e959f5
                                • Instruction Fuzzy Hash: 5B616A75900208EFDB22DFA8CC81FEEB7B8EB09714F14415AFE05AB2A1D774A945DB50
                                APIs
                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 003294FE
                                • SafeArrayAllocData.OLEAUT32(?), ref: 00329549
                                • VariantInit.OLEAUT32(?), ref: 0032955B
                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 0032957B
                                • VariantCopy.OLEAUT32(?,?), ref: 003295BE
                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 003295D2
                                • VariantClear.OLEAUT32(?), ref: 003295E7
                                • SafeArrayDestroyData.OLEAUT32(?), ref: 003295F4
                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 003295FD
                                • VariantClear.OLEAUT32(?), ref: 0032960F
                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0032961A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                • String ID:
                                • API String ID: 2706829360-0
                                • Opcode ID: d78a352b7021c9901d85c56c3999961377436abe8bc507c0d5a46415f507c88d
                                • Instruction ID: 954b41c6c3cd0a7f21058c723e5a724d6f68ee7fb3fe8bf4b923ed88f6bb220b
                                • Opcode Fuzzy Hash: d78a352b7021c9901d85c56c3999961377436abe8bc507c0d5a46415f507c88d
                                • Instruction Fuzzy Hash: 1B413231E00219AFCB12EFA5D848ADEBBBDFF08354F108065E515A7251DB35EA85CBA1
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Variant$ClearInit$_memset
                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$h?:$|?:
                                • API String ID: 2862541840-1826607493
                                • Opcode ID: f6d353259c07cd16f302195ef7aba6da02aa325a70d13bae1cd0df28fceacd44
                                • Instruction ID: 4f3e1fe937a902e1b53d8b6f5c5afa24fc9fa86363004cddd1d870c13fd5bb7a
                                • Opcode Fuzzy Hash: f6d353259c07cd16f302195ef7aba6da02aa325a70d13bae1cd0df28fceacd44
                                • Instruction Fuzzy Hash: AD916D71E00219ABDB26DFA5C884FAEBBB8EF45710F108559F515AF290DB70E944CFA0
                                APIs
                                  • Part of subcall function 002F936C: __swprintf.LIBCMT ref: 002F93AB
                                  • Part of subcall function 002F936C: __itow.LIBCMT ref: 002F93DF
                                • CoInitialize.OLE32 ref: 0034ADF6
                                • CoUninitialize.OLE32 ref: 0034AE01
                                • CoCreateInstance.OLE32(?,00000000,00000017,0037D8FC,?), ref: 0034AE61
                                • IIDFromString.OLE32(?,?), ref: 0034AED4
                                • VariantInit.OLEAUT32(?), ref: 0034AF6E
                                • VariantClear.OLEAUT32(?), ref: 0034AFCF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                • API String ID: 834269672-1287834457
                                • Opcode ID: f1e0d93e8c5e94413b585affc100f9fcd689d6ff99da1874de6c7b930af6c93a
                                • Instruction ID: 9a5452e7760dd689739ee6d6757492b3d5d45bfc5285345910b54c40b5f68e2d
                                • Opcode Fuzzy Hash: f1e0d93e8c5e94413b585affc100f9fcd689d6ff99da1874de6c7b930af6c93a
                                • Instruction Fuzzy Hash: 5E619A71248B11EFD722DF54C888B6AB7E8AF89704F004419F9859F291C770ED88CB93
                                APIs
                                • WSAStartup.WSOCK32(00000101,?), ref: 00348168
                                • inet_addr.WSOCK32(?,?,?), ref: 003481AD
                                • gethostbyname.WSOCK32(?), ref: 003481B9
                                • IcmpCreateFile.IPHLPAPI ref: 003481C7
                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00348237
                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 0034824D
                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 003482C2
                                • WSACleanup.WSOCK32 ref: 003482C8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                • String ID: Ping
                                • API String ID: 1028309954-2246546115
                                • Opcode ID: c31e924380959d6128511c1c4a2b021396e71b78eaae7de1f20a25175ae6876f
                                • Instruction ID: 989195de25a1b51fa00f055ea3fef523351b4da866d60cdbc53688d88b669f7e
                                • Opcode Fuzzy Hash: c31e924380959d6128511c1c4a2b021396e71b78eaae7de1f20a25175ae6876f
                                • Instruction Fuzzy Hash: F55181316047009FD722AF64CC85B6EB7E9EF48310F054929FA5ADF2A1DB70E945CB41
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0033E396
                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0033E40C
                                • GetLastError.KERNEL32 ref: 0033E416
                                • SetErrorMode.KERNEL32(00000000,READY), ref: 0033E483
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Error$Mode$DiskFreeLastSpace
                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                • API String ID: 4194297153-14809454
                                • Opcode ID: fccbd1efe8a2a1725e3157de2991ec51c4a64a360f3d26fd9bfeca3e1e8d64bf
                                • Instruction ID: faa769bf9913d696f9e51c6cba7582aed2f825bacfe53f0e2c5452b5e1c45194
                                • Opcode Fuzzy Hash: fccbd1efe8a2a1725e3157de2991ec51c4a64a360f3d26fd9bfeca3e1e8d64bf
                                • Instruction Fuzzy Hash: 8731B235A00209AFDB02EB65CD85ABEB7B8EF09300F148025F506AB2D1DB70AA41CB51
                                APIs
                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 0032B98C
                                • GetDlgCtrlID.USER32 ref: 0032B997
                                • GetParent.USER32 ref: 0032B9B3
                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 0032B9B6
                                • GetDlgCtrlID.USER32(?), ref: 0032B9BF
                                • GetParent.USER32(?), ref: 0032B9DB
                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 0032B9DE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$CtrlParent
                                • String ID: ComboBox$ListBox
                                • API String ID: 1383977212-1403004172
                                • Opcode ID: f3f75272226fef9d8767d063fe2340012209fa0a009b410eb19db05382126e25
                                • Instruction ID: 2b2460adc101009f5491f707c52741480aec9c784cfcec0be3f7f6d72775ff08
                                • Opcode Fuzzy Hash: f3f75272226fef9d8767d063fe2340012209fa0a009b410eb19db05382126e25
                                • Instruction Fuzzy Hash: 4D21F574900108BFDB06ABA4DC86EFEBB78EF4A310F50011AF655A72E1DB745865DF60
                                APIs
                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 0032BA73
                                • GetDlgCtrlID.USER32 ref: 0032BA7E
                                • GetParent.USER32 ref: 0032BA9A
                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 0032BA9D
                                • GetDlgCtrlID.USER32(?), ref: 0032BAA6
                                • GetParent.USER32(?), ref: 0032BAC2
                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 0032BAC5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$CtrlParent
                                • String ID: ComboBox$ListBox
                                • API String ID: 1383977212-1403004172
                                • Opcode ID: be79d888cdaee692e67c61aa17734a82e10196f7b3de3f4ecda67b947be19a47
                                • Instruction ID: 0ba8fb26521f49d2f0b7d1c99e684b4baa1f01ab16d0512b88f06114ff23edbe
                                • Opcode Fuzzy Hash: be79d888cdaee692e67c61aa17734a82e10196f7b3de3f4ecda67b947be19a47
                                • Instruction Fuzzy Hash: 6221F2B4A00108BFDB02ABA4DC85EFEBB78EF49300F100019F551A7291DBB5486A9F20
                                APIs
                                • GetParent.USER32 ref: 0032BAE3
                                • GetClassNameW.USER32(00000000,?,00000100), ref: 0032BAF8
                                • _wcscmp.LIBCMT ref: 0032BB0A
                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0032BB85
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ClassMessageNameParentSend_wcscmp
                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                • API String ID: 1704125052-3381328864
                                • Opcode ID: ad73fde1a6fe6765f226d1bdb43c37bd87d9007c3de42b24a6a2041ba048d611
                                • Instruction ID: 95a1ede1d645f64d4922197b5da3e22045ef71f79a0eb752e310ce194c575f1e
                                • Opcode Fuzzy Hash: ad73fde1a6fe6765f226d1bdb43c37bd87d9007c3de42b24a6a2041ba048d611
                                • Instruction Fuzzy Hash: 90110676608313FAFA2B6624FC0BDE7B7ACDF16720F200022F909E40D5EFA1A8915514
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 0034B2D5
                                • CoInitialize.OLE32(00000000), ref: 0034B302
                                • CoUninitialize.OLE32 ref: 0034B30C
                                • GetRunningObjectTable.OLE32(00000000,?), ref: 0034B40C
                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 0034B539
                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 0034B56D
                                • CoGetObject.OLE32(?,00000000,0037D91C,?), ref: 0034B590
                                • SetErrorMode.KERNEL32(00000000), ref: 0034B5A3
                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0034B623
                                • VariantClear.OLEAUT32(0037D91C), ref: 0034B633
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                • String ID:
                                • API String ID: 2395222682-0
                                • Opcode ID: b90be9e6c899549c1d522d33308c4cbd9477b0ee6999d121fa0c7e8ab826b564
                                • Instruction ID: 01f9f3a82d1bd9421c09c4d87d093dcbf067d2b84c3dfd8410ebd7cf210ead8a
                                • Opcode Fuzzy Hash: b90be9e6c899549c1d522d33308c4cbd9477b0ee6999d121fa0c7e8ab826b564
                                • Instruction Fuzzy Hash: 75C11171608305AFC701DF69C884A2BF7E9BF89348F00496DF98A9B251DB71ED05CB52
                                APIs
                                • __lock.LIBCMT ref: 0031ACC1
                                  • Part of subcall function 00317CF4: __mtinitlocknum.LIBCMT ref: 00317D06
                                  • Part of subcall function 00317CF4: EnterCriticalSection.KERNEL32(00000000,?,00317ADD,0000000D), ref: 00317D1F
                                • __calloc_crt.LIBCMT ref: 0031ACD2
                                  • Part of subcall function 00316986: __calloc_impl.LIBCMT ref: 00316995
                                  • Part of subcall function 00316986: Sleep.KERNEL32(00000000,000003BC,0030F507,?,0000000E), ref: 003169AC
                                • @_EH4_CallFilterFunc@8.LIBCMT ref: 0031ACED
                                • GetStartupInfoW.KERNEL32(?,003A6E28,00000064,00315E91,003A6C70,00000014), ref: 0031AD46
                                • __calloc_crt.LIBCMT ref: 0031AD91
                                • GetFileType.KERNEL32(00000001), ref: 0031ADD8
                                • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 0031AE11
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                • String ID:
                                • API String ID: 1426640281-0
                                • Opcode ID: 5439e3d3b81b3ab96d8d5ad7d74c1d004497d7d4f13cf5ee7293959656bbf5cb
                                • Instruction ID: ac732858ba644833de8aae0018df4f57b78326b85249a21ba9c53ad6fb45250c
                                • Opcode Fuzzy Hash: 5439e3d3b81b3ab96d8d5ad7d74c1d004497d7d4f13cf5ee7293959656bbf5cb
                                • Instruction Fuzzy Hash: A081B271906A458FDB2ACF68C8405EEBBF4AF4D325B24435DD4A6AB3D1C7349883CB51
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 00334047
                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,003330A5,?,00000001), ref: 0033405B
                                • GetWindowThreadProcessId.USER32(00000000), ref: 00334062
                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003330A5,?,00000001), ref: 00334071
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00334083
                                • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,003330A5,?,00000001), ref: 0033409C
                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003330A5,?,00000001), ref: 003340AE
                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,003330A5,?,00000001), ref: 003340F3
                                • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,003330A5,?,00000001), ref: 00334108
                                • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,003330A5,?,00000001), ref: 00334113
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                • String ID:
                                • API String ID: 2156557900-0
                                • Opcode ID: 3ffa93a0160ff6e17b9ca23f7d3384f50d95132f45339fb2cea9fe2c10fc0b08
                                • Instruction ID: 92f3e96cfd198cda40db3e889863e55e21dab1e6507dad7dbec082c89aa72dec
                                • Opcode Fuzzy Hash: 3ffa93a0160ff6e17b9ca23f7d3384f50d95132f45339fb2cea9fe2c10fc0b08
                                • Instruction Fuzzy Hash: 9E319171A00624AFDB23DF94DC85B697BBDFF54315F118115FA08E62A4DBB4EA80CB60
                                APIs
                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 002F30DC
                                • CoUninitialize.OLE32(?,00000000), ref: 002F3181
                                • UnregisterHotKey.USER32(?), ref: 002F32A9
                                • DestroyWindow.USER32(?), ref: 00365079
                                • FreeLibrary.KERNEL32(?), ref: 003650F8
                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00365125
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                • String ID: close all
                                • API String ID: 469580280-3243417748
                                • Opcode ID: 8facf0d572447ce298e643d66c52bd1f2b35695c2a22b63089f142b05d194351
                                • Instruction ID: 0b71e362d394495f3d342760029e088058bf3e8d5ef41b87734e6da630358dfb
                                • Opcode Fuzzy Hash: 8facf0d572447ce298e643d66c52bd1f2b35695c2a22b63089f142b05d194351
                                • Instruction Fuzzy Hash: 77912A3462110A8FC716EF14C895A79F3A8FF15344F5581B9E60AA7262DF30AE66CF50
                                APIs
                                • SetWindowLongW.USER32(?,000000EB), ref: 0030CC15
                                  • Part of subcall function 0030CCCD: GetClientRect.USER32(?,?), ref: 0030CCF6
                                  • Part of subcall function 0030CCCD: GetWindowRect.USER32(?,?), ref: 0030CD37
                                  • Part of subcall function 0030CCCD: ScreenToClient.USER32(?,?), ref: 0030CD5F
                                • GetDC.USER32 ref: 0036D137
                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0036D14A
                                • SelectObject.GDI32(00000000,00000000), ref: 0036D158
                                • SelectObject.GDI32(00000000,00000000), ref: 0036D16D
                                • ReleaseDC.USER32(?,00000000), ref: 0036D175
                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0036D200
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                • String ID: U
                                • API String ID: 4009187628-3372436214
                                • Opcode ID: 4c8b4a7100bbc6fe4ac91d90ec018629f45e08ea2b5856663573d20d5e0f0609
                                • Instruction ID: aaebeb1e08581101dc8978cb16f0bf96e6df09fe84c6bbf6c54bee58ea34993a
                                • Opcode Fuzzy Hash: 4c8b4a7100bbc6fe4ac91d90ec018629f45e08ea2b5856663573d20d5e0f0609
                                • Instruction Fuzzy Hash: B571E330A00209DFCF23DF64CC91AAA7BB9FF49314F198669ED555A2AAD7318C81DF50
                                APIs
                                  • Part of subcall function 0030B34E: GetWindowLongW.USER32(?,000000EB), ref: 0030B35F
                                  • Part of subcall function 0030B63C: GetCursorPos.USER32(000000FF), ref: 0030B64F
                                  • Part of subcall function 0030B63C: ScreenToClient.USER32(00000000,000000FF), ref: 0030B66C
                                  • Part of subcall function 0030B63C: GetAsyncKeyState.USER32(00000001), ref: 0030B691
                                  • Part of subcall function 0030B63C: GetAsyncKeyState.USER32(00000002), ref: 0030B69F
                                • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 0035ED3C
                                • ImageList_EndDrag.COMCTL32 ref: 0035ED42
                                • ReleaseCapture.USER32 ref: 0035ED48
                                • SetWindowTextW.USER32(?,00000000), ref: 0035EDF0
                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0035EE03
                                • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 0035EEDC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                • API String ID: 1924731296-2107944366
                                • Opcode ID: 67afa1556541f211b3ad5836d77b52dc6986650be211cb363331154700dbb83f
                                • Instruction ID: ff015ecce6e9176fc9d7d1269b96829f1b2dffb52eec8f5d022432a861e88fbe
                                • Opcode Fuzzy Hash: 67afa1556541f211b3ad5836d77b52dc6986650be211cb363331154700dbb83f
                                • Instruction Fuzzy Hash: 8E51BC30104304AFD716DF24DCAAFAA77F8FB88714F504A2DFA85962E1DB709958CB52
                                APIs
                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003445FF
                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0034462B
                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0034466D
                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00344682
                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0034468F
                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 003446BF
                                • InternetCloseHandle.WININET(00000000), ref: 00344706
                                  • Part of subcall function 00345052: GetLastError.KERNEL32(?,?,003443CC,00000000,00000000,00000001), ref: 00345067
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                • String ID:
                                • API String ID: 1241431887-3916222277
                                • Opcode ID: b972490f1ce6525507b8cb299b93182335ed1043379c2c3930d521dc59f21722
                                • Instruction ID: 9e1a24551e76a7ff8b2a8cb100fd090316cfd53dfeddfb78b8b78e175a9705ca
                                • Opcode Fuzzy Hash: b972490f1ce6525507b8cb299b93182335ed1043379c2c3930d521dc59f21722
                                • Instruction Fuzzy Hash: 57417BB1501209BFEB179F50CC89FBA7BECEF09354F11402AFA059E181DBB4A9448BA4
                                APIs
                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0038DC00), ref: 0034B715
                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0038DC00), ref: 0034B749
                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 0034B8C1
                                • SysFreeString.OLEAUT32(?), ref: 0034B8EB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                • String ID:
                                • API String ID: 560350794-0
                                • Opcode ID: 7eb86e58c40a484dba3da1f7d93d1eab6f3cb0e31d67e229084552091495148d
                                • Instruction ID: ca3e1ecdc9a70f5abf82434008bc0e59497b2d2bbeac2d068d9de9150d0f8d20
                                • Opcode Fuzzy Hash: 7eb86e58c40a484dba3da1f7d93d1eab6f3cb0e31d67e229084552091495148d
                                • Instruction Fuzzy Hash: 06F11775A00209EFCB15DF94C884EAEB7B9FF49315F118499F905AB250DB31EE46CB90
                                APIs
                                • _memset.LIBCMT ref: 003524F5
                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00352688
                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003526AC
                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003526EC
                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0035270E
                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0035286F
                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 003528A1
                                • CloseHandle.KERNEL32(?), ref: 003528D0
                                • CloseHandle.KERNEL32(?), ref: 00352947
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                • String ID:
                                • API String ID: 4090791747-0
                                • Opcode ID: db6839d32b7c8216e59aa96a22fec6d2d8854a54d10244a1d9d82508ac249401
                                • Instruction ID: 553b2865f36920f07f66a8d20ff6f2564e2b0fc89856a2d84e901aca2e5cd2e1
                                • Opcode Fuzzy Hash: db6839d32b7c8216e59aa96a22fec6d2d8854a54d10244a1d9d82508ac249401
                                • Instruction Fuzzy Hash: 70D1A031604200DFC716EF24C891E6ABBE5AF86310F19896DF9999F2A2DB31DC45CF52
                                APIs
                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0035B3F4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: InvalidateRect
                                • String ID:
                                • API String ID: 634782764-0
                                • Opcode ID: 5eb5ea54360b0e1c2885326e1ed1f39c639a4c767f03666d0823476d099dfae4
                                • Instruction ID: 2cecd870ba1eab08597ce09b89e4de3b051f608e56bee935b252d68bd404ba44
                                • Opcode Fuzzy Hash: 5eb5ea54360b0e1c2885326e1ed1f39c639a4c767f03666d0823476d099dfae4
                                • Instruction Fuzzy Hash: EB51BF74501204BBEF379F29CC85FADBB68AB05326F644411FE14EA6F2D771E9888B50
                                APIs
                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0036DB1B
                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0036DB3C
                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0036DB51
                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0036DB6E
                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0036DB95
                                • DestroyIcon.USER32(00000000,?,?,?,?,?,?,0030A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0036DBA0
                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0036DBBD
                                • DestroyIcon.USER32(00000000,?,?,?,?,?,?,0030A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0036DBC8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Icon$DestroyExtractImageLoadMessageSend
                                • String ID:
                                • API String ID: 1268354404-0
                                • Opcode ID: b25eee3dade0737c5fa9bd5092739d9ad856e5479e5844d74b29e1271b8d2d7c
                                • Instruction ID: 0d59251b03d3d91ee5b8a3bb055577dcb22f3d282453958dee089b3ce39cb887
                                • Opcode Fuzzy Hash: b25eee3dade0737c5fa9bd5092739d9ad856e5479e5844d74b29e1271b8d2d7c
                                • Instruction Fuzzy Hash: 36517A70A01708EFDB22DF68DCA1FAA77B8AF48754F114618F9069B6D0D7B0AD80DB50
                                APIs
                                  • Part of subcall function 00336EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00335FA6,?), ref: 00336ED8
                                  • Part of subcall function 00336EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00335FA6,?), ref: 00336EF1
                                  • Part of subcall function 003372CB: GetFileAttributesW.KERNEL32(?,00336019), ref: 003372CC
                                • lstrcmpiW.KERNEL32(?,?), ref: 003375CA
                                • _wcscmp.LIBCMT ref: 003375E2
                                • MoveFileW.KERNEL32(?,?), ref: 003375FB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                • String ID:
                                • API String ID: 793581249-0
                                • Opcode ID: 571062bf585ab5a927b4b3ecc3e368afca0c38788e11c8c3102fac580f77c062
                                • Instruction ID: 2c370bdcde4c70e0a6477c5a230069b541a206151a81264fc6a56f7f2358f53b
                                • Opcode Fuzzy Hash: 571062bf585ab5a927b4b3ecc3e368afca0c38788e11c8c3102fac580f77c062
                                • Instruction Fuzzy Hash: 305132F29092195ADF66EB94D8819DE73BC9F0C310F00449AF605E7541EA7496C5CF64
                                APIs
                                • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0036DAD1,00000004,00000000,00000000), ref: 0030EAEB
                                • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,0036DAD1,00000004,00000000,00000000), ref: 0030EB32
                                • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,0036DAD1,00000004,00000000,00000000), ref: 0036DC86
                                • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0036DAD1,00000004,00000000,00000000), ref: 0036DCF2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ShowWindow
                                • String ID:
                                • API String ID: 1268545403-0
                                • Opcode ID: 6021a9f55b0a2ace840fc94494df7733eb69fc7c3ca6ea42a9d02590bb303488
                                • Instruction ID: 204d43d59c4223537a49393e44b858600ee5e084c8cafec29df319b1b04f7a53
                                • Opcode Fuzzy Hash: 6021a9f55b0a2ace840fc94494df7733eb69fc7c3ca6ea42a9d02590bb303488
                                • Instruction Fuzzy Hash: 6941F67170F6849AD73B4B288DADB3A7AAEAF45305F5A4C0DF14B86DE1C670B880C711
                                APIs
                                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0032AEF1,00000B00,?,?), ref: 0032B26C
                                • HeapAlloc.KERNEL32(00000000,?,0032AEF1,00000B00,?,?), ref: 0032B273
                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0032AEF1,00000B00,?,?), ref: 0032B288
                                • GetCurrentProcess.KERNEL32(?,00000000,?,0032AEF1,00000B00,?,?), ref: 0032B290
                                • DuplicateHandle.KERNEL32(00000000,?,0032AEF1,00000B00,?,?), ref: 0032B293
                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0032AEF1,00000B00,?,?), ref: 0032B2A3
                                • GetCurrentProcess.KERNEL32(0032AEF1,00000000,?,0032AEF1,00000B00,?,?), ref: 0032B2AB
                                • DuplicateHandle.KERNEL32(00000000,?,0032AEF1,00000B00,?,?), ref: 0032B2AE
                                • CreateThread.KERNEL32(00000000,00000000,0032B2D4,00000000,00000000,00000000), ref: 0032B2C8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                • String ID:
                                • API String ID: 1957940570-0
                                • Opcode ID: 5a2ea1b6654d63b9f8ea63f9847ebfc0e5f828a371b28efe48037b8d963cfc9b
                                • Instruction ID: dd98d691a6207b4f82b4f8536345542e26056a518ef9b18ae7900b5ab4d7d0cd
                                • Opcode Fuzzy Hash: 5a2ea1b6654d63b9f8ea63f9847ebfc0e5f828a371b28efe48037b8d963cfc9b
                                • Instruction Fuzzy Hash: 0F01B6B5240308BFE721ABA5DC49F6B7BACEF88711F458411FA09DB1A1CA749840CB61
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID: NULL Pointer assignment$Not an Object type
                                • API String ID: 0-572801152
                                • Opcode ID: a9cfe78d958a442f22b3f16770ff58c1f0c013ea4197128f0b8f6b85ccf42fbd
                                • Instruction ID: ed87b5163ac4b4f518c715fea0e42efa547558cc89d54fd17548edf335d1296b
                                • Opcode Fuzzy Hash: a9cfe78d958a442f22b3f16770ff58c1f0c013ea4197128f0b8f6b85ccf42fbd
                                • Instruction Fuzzy Hash: 40E1D071A11219AFCF52DFA8C881AEEB7F9EF48314F159069F905AF281D770AD41CB90
                                APIs
                                  • Part of subcall function 002F936C: __swprintf.LIBCMT ref: 002F93AB
                                  • Part of subcall function 002F936C: __itow.LIBCMT ref: 002F93DF
                                  • Part of subcall function 0030C6F4: _wcscpy.LIBCMT ref: 0030C717
                                • _wcstok.LIBCMT ref: 0034184E
                                • _wcscpy.LIBCMT ref: 003418DD
                                • _memset.LIBCMT ref: 00341910
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                • String ID: X$p2:l2:
                                • API String ID: 774024439-4260850672
                                • Opcode ID: 6e73dcb2720906bded907713fe175fb0ec6fd566d87e66c40da86d4c9429979d
                                • Instruction ID: 2a112df7129bd2e57c784c5a742d387dea104eeb5480bd34390b9b2e05b46474
                                • Opcode Fuzzy Hash: 6e73dcb2720906bded907713fe175fb0ec6fd566d87e66c40da86d4c9429979d
                                • Instruction Fuzzy Hash: 4AC16A355147449FC725EF24C981AAAF7E4BF85394F00492DF9899B2A2DB30E854CF82
                                APIs
                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00359B19
                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 00359B2D
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00359B47
                                • _wcscat.LIBCMT ref: 00359BA2
                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 00359BB9
                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00359BE7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$Window_wcscat
                                • String ID: SysListView32
                                • API String ID: 307300125-78025650
                                • Opcode ID: 25753b53a00b3faffadfb360609c17e4bc40b43cadb37a6ed2943d54f9ec26b1
                                • Instruction ID: 4388b2927838316f8ea5853edf5bf64f90a26bf6b8893dadac38ffcf798e1f70
                                • Opcode Fuzzy Hash: 25753b53a00b3faffadfb360609c17e4bc40b43cadb37a6ed2943d54f9ec26b1
                                • Instruction Fuzzy Hash: BE41A170900308EBEB229F64DC85FEE77B8EF08351F11042AF949A72A1D6719D88CB60
                                APIs
                                  • Part of subcall function 00336532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00336554
                                  • Part of subcall function 00336532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 00336564
                                  • Part of subcall function 00336532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 003365F9
                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0035179A
                                • GetLastError.KERNEL32 ref: 003517AD
                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003517D9
                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 00351855
                                • GetLastError.KERNEL32(00000000), ref: 00351860
                                • CloseHandle.KERNEL32(00000000), ref: 00351895
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                • String ID: SeDebugPrivilege
                                • API String ID: 2533919879-2896544425
                                • Opcode ID: d48df14c4ef67bbe9c8ffbb277f8922b146e1774c09ead957073abdbee1064bc
                                • Instruction ID: 3e67a2288c1386841467363d9fee1a53c80c27d2d93c14a32f5e6f7455a82eac
                                • Opcode Fuzzy Hash: d48df14c4ef67bbe9c8ffbb277f8922b146e1774c09ead957073abdbee1064bc
                                • Instruction Fuzzy Hash: 81419F71600200AFDB16EF54C8E5FAEB7B5AF54311F058058F9069F2E2DBB5A948CF91
                                APIs
                                • LoadIconW.USER32(00000000,00007F03), ref: 003358B8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: IconLoad
                                • String ID: blank$info$question$stop$warning
                                • API String ID: 2457776203-404129466
                                • Opcode ID: 179f25bff854cffc09ddb32c24bf24c20862b7d70250990a7d6a32a83e27cdb8
                                • Instruction ID: 15d7be1ce89f777352db240b98990ab236b4112e37c2f22257207e4b9589fa6b
                                • Opcode Fuzzy Hash: 179f25bff854cffc09ddb32c24bf24c20862b7d70250990a7d6a32a83e27cdb8
                                • Instruction Fuzzy Hash: 5911EB32709742FAE71B5B549CC3DEA73DCEF15714F20003AF511BD281E7A0AA814264
                                APIs
                                • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 0033A806
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ArraySafeVartype
                                • String ID:
                                • API String ID: 1725837607-0
                                • Opcode ID: 433ccdf1e4695f43c7114a211aa9e969cd6c2d45e27cf937ea12ebb5ea0afb17
                                • Instruction ID: 9cf6bb240001834f9a93304c7f1d9297c268a6928cf5570ecbf49ed7021d1bf0
                                • Opcode Fuzzy Hash: 433ccdf1e4695f43c7114a211aa9e969cd6c2d45e27cf937ea12ebb5ea0afb17
                                • Instruction Fuzzy Hash: 70C1AD71A0460ADFDB12CF98C4C1BAEB7F4FF08315F20406AE685EB281D735A981CB91
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00336B63
                                • LoadStringW.USER32(00000000), ref: 00336B6A
                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00336B80
                                • LoadStringW.USER32(00000000), ref: 00336B87
                                • _wprintf.LIBCMT ref: 00336BAD
                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00336BCB
                                Strings
                                • %s (%d) : ==> %s: %s %s, xrefs: 00336BA8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: HandleLoadModuleString$Message_wprintf
                                • String ID: %s (%d) : ==> %s: %s %s
                                • API String ID: 3648134473-3128320259
                                • Opcode ID: 5344b3f823a7fb72bcda2be34b9fb582b04da9cbd8b9b124afd33f5f9216b58f
                                • Instruction ID: adedcc6c0821e4d90f8b1ca2ce04a8344c0694c9fda37840c4c82c62ccf0d090
                                • Opcode Fuzzy Hash: 5344b3f823a7fb72bcda2be34b9fb582b04da9cbd8b9b124afd33f5f9216b58f
                                • Instruction Fuzzy Hash: A40112F65002087FEB52AB949D89EF6777CDB08304F404495B749E6041EA749EC48F75
                                APIs
                                  • Part of subcall function 00353C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00352BB5,?,?), ref: 00353C1D
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00352BF6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: BuffCharConnectRegistryUpper
                                • String ID:
                                • API String ID: 2595220575-0
                                • Opcode ID: 6b354c1d1256e96ccca36b7b1cbd5e799389c3395cabd0cbec2e8c30df7e0a1c
                                • Instruction ID: 2f0e04fb3c24d44adefb04b9c44db9fa7564af5398555c91849b18ed6fdc52ae
                                • Opcode Fuzzy Hash: 6b354c1d1256e96ccca36b7b1cbd5e799389c3395cabd0cbec2e8c30df7e0a1c
                                • Instruction Fuzzy Hash: C29166312042059FCB12EF14C895E6EB7F5BF89310F04885DF9969B2A2DB34E949CF42
                                APIs
                                • select.WSOCK32 ref: 00349691
                                • WSAGetLastError.WSOCK32(00000000), ref: 0034969E
                                • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 003496C8
                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 003496E9
                                • WSAGetLastError.WSOCK32(00000000), ref: 003496F8
                                • htons.WSOCK32(?,?,?,00000000,?), ref: 003497AA
                                • inet_ntoa.WSOCK32(?,?,?,?,?,?,?,?,?,?,?,?,0038DC00), ref: 00349765
                                  • Part of subcall function 0032D2FF: _strlen.LIBCMT ref: 0032D309
                                • _strlen.LIBCMT ref: 00349800
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorLast_strlen$htonsinet_ntoaselect
                                • String ID:
                                • API String ID: 3480843537-0
                                • Opcode ID: 3687701bfe54670fffa1addf836fa7edd8de920c31c61d77d3b2b3273d84d975
                                • Instruction ID: 7bd593101c5bc5674fafcff8b910f2236c8e242fa17a4dc8e7a3b05718657e16
                                • Opcode Fuzzy Hash: 3687701bfe54670fffa1addf836fa7edd8de920c31c61d77d3b2b3273d84d975
                                • Instruction Fuzzy Hash: A781CE31504204AFC716EF64CC85F6BB7E9EF85714F104A2EF5559B2A2EB30E904CB92
                                APIs
                                • __mtinitlocknum.LIBCMT ref: 0031A991
                                  • Part of subcall function 00317D7C: __FF_MSGBANNER.LIBCMT ref: 00317D91
                                  • Part of subcall function 00317D7C: __NMSG_WRITE.LIBCMT ref: 00317D98
                                  • Part of subcall function 00317D7C: __malloc_crt.LIBCMT ref: 00317DB8
                                • __lock.LIBCMT ref: 0031A9A4
                                • __lock.LIBCMT ref: 0031A9F0
                                • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,003A6DE0,00000018,00325E7B,?,00000000,00000109), ref: 0031AA0C
                                • EnterCriticalSection.KERNEL32(8000000C,003A6DE0,00000018,00325E7B,?,00000000,00000109), ref: 0031AA29
                                • LeaveCriticalSection.KERNEL32(8000000C), ref: 0031AA39
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                • String ID:
                                • API String ID: 1422805418-0
                                • Opcode ID: 81385aecad8952151989c3356520eb39e7175a49d048e671a3234ad7d09f1f3a
                                • Instruction ID: 08b80f71e5535bfc38d5b56b8f958a00f2f36b457c77fa553f2f155b57acc856
                                • Opcode Fuzzy Hash: 81385aecad8952151989c3356520eb39e7175a49d048e671a3234ad7d09f1f3a
                                • Instruction Fuzzy Hash: CA416D71902A059BEB2E8F68D9417DDB7B4AF09336F158318E525AF2D1D774D8C0CB81
                                APIs
                                • DeleteObject.GDI32(00000000), ref: 00358EE4
                                • GetDC.USER32(00000000), ref: 00358EEC
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00358EF7
                                • ReleaseDC.USER32(00000000,00000000), ref: 00358F03
                                • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00358F3F
                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00358F50
                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0035BD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00358F8A
                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00358FAA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                • String ID:
                                • API String ID: 3864802216-0
                                • Opcode ID: c654c737e1b750b18cb032bad91182de43ebc68483611424d568d0824fc0b5f4
                                • Instruction ID: 5598063093bb7cdd9982362892d19ab80bf52217e4ed0e83d35f9ae9de7c8cce
                                • Opcode Fuzzy Hash: c654c737e1b750b18cb032bad91182de43ebc68483611424d568d0824fc0b5f4
                                • Instruction Fuzzy Hash: 7B317F72200214BFEB228F54DC4AFEA3BADEF49716F054065FE08AA191C6759841CB70
                                APIs
                                  • Part of subcall function 0030B34E: GetWindowLongW.USER32(?,000000EB), ref: 0030B35F
                                • GetSystemMetrics.USER32(0000000F), ref: 0036016D
                                • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 0036038D
                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 003603AB
                                • InvalidateRect.USER32(?,00000000,00000001,?), ref: 003603D6
                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 003603FF
                                • ShowWindow.USER32(00000003,00000000), ref: 00360421
                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 00360440
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
                                • String ID:
                                • API String ID: 3356174886-0
                                • Opcode ID: c228552a28c87abbd6e7f2f39ec7080a55831d90b1afdae98a29c45906b5094d
                                • Instruction ID: 6874349633df4f371ac8a3f42dbd0ee7803b3b0534eeadac97fcb1b54df3c730
                                • Opcode Fuzzy Hash: c228552a28c87abbd6e7f2f39ec7080a55831d90b1afdae98a29c45906b5094d
                                • Instruction Fuzzy Hash: 4BA1CD34600616EBDB1ACF68C99A7BEBBB5FF08701F15C115EC58AB298D734AD50CB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8662c06c0ed37eaf8d0541690a6db4a652b32a94fe7d461ee9c04db4cfb88663
                                • Instruction ID: 202d68abf62d51ab3220ba94f7f5cf8be0928302668807884ff078f57e0d848f
                                • Opcode Fuzzy Hash: 8662c06c0ed37eaf8d0541690a6db4a652b32a94fe7d461ee9c04db4cfb88663
                                • Instruction Fuzzy Hash: C3718F7190160AEFCB16CF98CC58EAEBB79FF85310F248149F915AB290C730AA51CF61
                                APIs
                                • _memset.LIBCMT ref: 0035225A
                                • _memset.LIBCMT ref: 00352323
                                • ShellExecuteExW.SHELL32(?), ref: 00352368
                                  • Part of subcall function 002F936C: __swprintf.LIBCMT ref: 002F93AB
                                  • Part of subcall function 002F936C: __itow.LIBCMT ref: 002F93DF
                                  • Part of subcall function 0030C6F4: _wcscpy.LIBCMT ref: 0030C717
                                • CloseHandle.KERNEL32(00000000), ref: 0035242F
                                • FreeLibrary.KERNEL32(00000000), ref: 0035243E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                • String ID: @
                                • API String ID: 4082843840-2766056989
                                • Opcode ID: fda8fceba8e65ff0627ac73ad9473392ac1a0e0459adc305f0db71ccead076ec
                                • Instruction ID: 6e642759b1e41e468c82ec4ad44a63568ed8700ff59960aac32910eb39647950
                                • Opcode Fuzzy Hash: fda8fceba8e65ff0627ac73ad9473392ac1a0e0459adc305f0db71ccead076ec
                                • Instruction Fuzzy Hash: C3718DB4A006199FCF16EFA4C8919AEB7F5FF49310F118469E855AB3A1CB34AD44CF90
                                APIs
                                • GetParent.USER32(00000000), ref: 00333C02
                                • GetKeyboardState.USER32(?), ref: 00333C17
                                • SetKeyboardState.USER32(?), ref: 00333C78
                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00333CA4
                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00333CC1
                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00333D05
                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00333D26
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$Parent
                                • String ID:
                                • API String ID: 87235514-0
                                • Opcode ID: d0bcab3f62a41411bf8da8bf6bfb2a27ed643bb890e73fff553f0ee3ce8b9f66
                                • Instruction ID: 0a64b4829473c7ec9ff48ee24128622affa53961b58eab453f490292bdc43aa9
                                • Opcode Fuzzy Hash: d0bcab3f62a41411bf8da8bf6bfb2a27ed643bb890e73fff553f0ee3ce8b9f66
                                • Instruction Fuzzy Hash: 8451E6A05087D53DFB3387748C96BB6BFA96F06300F08C589E0D55A8C2D694EED4D760
                                APIs
                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00358FE7
                                • GetWindowLongW.USER32(00DDDD00,000000F0), ref: 0035901A
                                • GetWindowLongW.USER32(00DDDD00,000000F0), ref: 0035904F
                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00359081
                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 003590AB
                                • GetWindowLongW.USER32(00000000,000000F0), ref: 003590BC
                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 003590D6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: LongWindow$MessageSend
                                • String ID:
                                • API String ID: 2178440468-0
                                • Opcode ID: 6ace212753205e39586d642d7c2ac22c7d508d2b91df8af47bd479d6951986f9
                                • Instruction ID: 08018c57c4fc51e61c772ef8cf528f30bd94e72d533bad0063455859f11bd30f
                                • Opcode Fuzzy Hash: 6ace212753205e39586d642d7c2ac22c7d508d2b91df8af47bd479d6951986f9
                                • Instruction Fuzzy Hash: 9F312434600215EFDB228F58DC84F6477B9FB4A769F1502A6FA198F2F1CB71A844DB81
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003308F2
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00330918
                                • SysAllocString.OLEAUT32(00000000), ref: 0033091B
                                • SysAllocString.OLEAUT32(?), ref: 00330939
                                • SysFreeString.OLEAUT32(?), ref: 00330942
                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00330967
                                • SysAllocString.OLEAUT32(?), ref: 00330975
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                • String ID:
                                • API String ID: 3761583154-0
                                • Opcode ID: 7fde5a35e987c80ee94b90b67320ff7d451bf610b687576a54ef4ed83cdab0c9
                                • Instruction ID: 9483a2d2bef4619382f68c4dbf0a38e604f32c46faa5af903143157aed799fb7
                                • Opcode Fuzzy Hash: 7fde5a35e987c80ee94b90b67320ff7d451bf610b687576a54ef4ed83cdab0c9
                                • Instruction Fuzzy Hash: A321B572601208AFEB219F68CC88EBB73BCEF09760F008125F919DB161D770EC418B60
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                • API String ID: 1038674560-2734436370
                                • Opcode ID: 14df49913f1441f8ee99ab5f4773976b849afdc1b0eafc9cbfac0fb6477e40fc
                                • Instruction ID: 8117df8ebdc083cb9fe0b0c9bc0f5c51c0bfe3f6b87fba175f3307412901f2a0
                                • Opcode Fuzzy Hash: 14df49913f1441f8ee99ab5f4773976b849afdc1b0eafc9cbfac0fb6477e40fc
                                • Instruction Fuzzy Hash: 4921493220521167D737BB36DC52EFBB39CEF66310F608029F5469B582E6619A82C395
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003309CB
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003309F1
                                • SysAllocString.OLEAUT32(00000000), ref: 003309F4
                                • SysAllocString.OLEAUT32 ref: 00330A15
                                • SysFreeString.OLEAUT32 ref: 00330A1E
                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00330A38
                                • SysAllocString.OLEAUT32(?), ref: 00330A46
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                • String ID:
                                • API String ID: 3761583154-0
                                • Opcode ID: ac69fabf25f49b28685eab8ab0d0461a1dadcbe8b03a45e9a0707b095e948e46
                                • Instruction ID: d39bdd62b4f8128763265a6bd48b8715428122d9b6fd9ccdeab81f32e946684b
                                • Opcode Fuzzy Hash: ac69fabf25f49b28685eab8ab0d0461a1dadcbe8b03a45e9a0707b095e948e46
                                • Instruction Fuzzy Hash: 1C218675200204AFDB25DFA9DCD9DAA77ECEF08360F418125F909CB2A1DA74EC818764
                                APIs
                                  • Part of subcall function 0030D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0030D1BA
                                  • Part of subcall function 0030D17C: GetStockObject.GDI32(00000011), ref: 0030D1CE
                                  • Part of subcall function 0030D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0030D1D8
                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 0035A32D
                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0035A33A
                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0035A345
                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 0035A354
                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 0035A360
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$CreateObjectStockWindow
                                • String ID: Msctls_Progress32
                                • API String ID: 1025951953-3636473452
                                • Opcode ID: 6238373278f9d108fb561b870fbb59e53b43336ef9d0f5897b40971511817df9
                                • Instruction ID: aa2be0a0190c6f6e3f14b34ed05c333db867694632f7059f95480a0989e2aa58
                                • Opcode Fuzzy Hash: 6238373278f9d108fb561b870fbb59e53b43336ef9d0f5897b40971511817df9
                                • Instruction Fuzzy Hash: 4F11B2B1150219BEEF165FA4CC85EEB7F6DFF09798F014214FA08A60A0C7729C25DBA4
                                APIs
                                • GetClientRect.USER32(?,?), ref: 0030CCF6
                                • GetWindowRect.USER32(?,?), ref: 0030CD37
                                • ScreenToClient.USER32(?,?), ref: 0030CD5F
                                • GetClientRect.USER32(?,?), ref: 0030CE8C
                                • GetWindowRect.USER32(?,?), ref: 0030CEA5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Rect$Client$Window$Screen
                                • String ID:
                                • API String ID: 1296646539-0
                                • Opcode ID: 71a0b606295465afbd1781f70cdc9e90b53b87f18e74b32916facc2cf18af917
                                • Instruction ID: 2c51683fc1fb1c0a15952a72adc05627fc95258fba0abba14fbcbe17f8745684
                                • Opcode Fuzzy Hash: 71a0b606295465afbd1781f70cdc9e90b53b87f18e74b32916facc2cf18af917
                                • Instruction Fuzzy Hash: 82B1AD79910249DBDF11CFA8C4907EEBBB5FF08300F15A229EC59EB694DB30A940DB64
                                APIs
                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00351C18
                                • Process32FirstW.KERNEL32(00000000,?), ref: 00351C26
                                • __wsplitpath.LIBCMT ref: 00351C54
                                  • Part of subcall function 00311DFC: __wsplitpath_helper.LIBCMT ref: 00311E3C
                                • _wcscat.LIBCMT ref: 00351C69
                                • Process32NextW.KERNEL32(00000000,?), ref: 00351CDF
                                • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00351CF1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                • String ID:
                                • API String ID: 1380811348-0
                                • Opcode ID: ff1fc8aaf3387b458e026849495980422397f1edb61df4bbeeb73f37a1bba3ac
                                • Instruction ID: e346c443aec699744e525eab355aabeb54e5091ea7207b9ccffa15ca4aa0a586
                                • Opcode Fuzzy Hash: ff1fc8aaf3387b458e026849495980422397f1edb61df4bbeeb73f37a1bba3ac
                                • Instruction Fuzzy Hash: 075170711043049FD721EF24C885EABB7ECEF88754F00492EF9899B291DB70E944CB92
                                APIs
                                  • Part of subcall function 00353C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00352BB5,?,?), ref: 00353C1D
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003530AF
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003530EF
                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00353112
                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0035313B
                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0035317E
                                • RegCloseKey.ADVAPI32(00000000), ref: 0035318B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                • String ID:
                                • API String ID: 3451389628-0
                                • Opcode ID: fd57d331e332eb5adf317a1da4f28ed08a5664e02fc8320cc73ed9d33a89e725
                                • Instruction ID: 4667a996879d385fadc764777ead3632f1feb8d4a98cb8734f4d4904d27cd8cd
                                • Opcode Fuzzy Hash: fd57d331e332eb5adf317a1da4f28ed08a5664e02fc8320cc73ed9d33a89e725
                                • Instruction Fuzzy Hash: 7F515831118304AFC711EF64C881E6AB7F9FF88384F04492DFA459B2A1DB71EA19CB52
                                APIs
                                • GetMenu.USER32(?), ref: 00358540
                                • GetMenuItemCount.USER32(00000000), ref: 00358577
                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0035859F
                                • GetMenuItemID.USER32(?,?), ref: 0035860E
                                • GetSubMenu.USER32(?,?), ref: 0035861C
                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 0035866D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Menu$Item$CountMessagePostString
                                • String ID:
                                • API String ID: 650687236-0
                                • Opcode ID: 074c3b773ad5f539a0d7d9b15df86c7c11811bbc1f2895fc08661b4b0304b1e0
                                • Instruction ID: 34fe4fb4fc946ddd4d9627a5cc26b9196dff736ef34bf7400cfad0df370ceeda
                                • Opcode Fuzzy Hash: 074c3b773ad5f539a0d7d9b15df86c7c11811bbc1f2895fc08661b4b0304b1e0
                                • Instruction Fuzzy Hash: F2516E71A00219AFCB12EF64C845EAEB7F8EF49310F114469EE15BB361DB70AE458F91
                                APIs
                                • _memset.LIBCMT ref: 00334B10
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00334B5B
                                • IsMenu.USER32(00000000), ref: 00334B7B
                                • CreatePopupMenu.USER32 ref: 00334BAF
                                • GetMenuItemCount.USER32(000000FF), ref: 00334C0D
                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00334C3E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                • String ID:
                                • API String ID: 3311875123-0
                                • Opcode ID: 1235ae8de46eb6ade03576659a99b44a61792eb79cea0d186c5cd68cfc481c79
                                • Instruction ID: a2aa98956c0b702b04150aec61d6ff985637cb498b4bbde1fb454c5f0a30cd40
                                • Opcode Fuzzy Hash: 1235ae8de46eb6ade03576659a99b44a61792eb79cea0d186c5cd68cfc481c79
                                • Instruction Fuzzy Hash: 9B51D170601309EFDF26CF68D8C8BADBBF8AF45318F144159E4559B2A1E371A984CB51
                                APIs
                                • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,0038DC00), ref: 00348E7C
                                • WSAGetLastError.WSOCK32(00000000), ref: 00348E89
                                • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 00348EAD
                                • #16.WSOCK32(?,?,00000000,00000000), ref: 00348EC5
                                • _strlen.LIBCMT ref: 00348EF7
                                • WSAGetLastError.WSOCK32(00000000), ref: 00348F6A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorLast$_strlenselect
                                • String ID:
                                • API String ID: 2217125717-0
                                • Opcode ID: d72d6098eec554566111d5cafd7e98f91ceeaa49493c09cf03ccb9e2ff2aba14
                                • Instruction ID: 180f419d0c370fefc0e3177ab8509feb8c24e25ca21dead63ec8c7442a941ec0
                                • Opcode Fuzzy Hash: d72d6098eec554566111d5cafd7e98f91ceeaa49493c09cf03ccb9e2ff2aba14
                                • Instruction Fuzzy Hash: E041B171500108AFCB15EF64DD86EAEB7BDAF08354F104569F51AAB2D1DF30AE44CB60
                                APIs
                                  • Part of subcall function 0030B34E: GetWindowLongW.USER32(?,000000EB), ref: 0030B35F
                                • BeginPaint.USER32(?,?,?), ref: 0030AC2A
                                • GetWindowRect.USER32(?,?), ref: 0030AC8E
                                • ScreenToClient.USER32(?,?), ref: 0030ACAB
                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0030ACBC
                                • EndPaint.USER32(?,?,?,?,?), ref: 0030AD06
                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0036E673
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                • String ID:
                                • API String ID: 2592858361-0
                                • Opcode ID: 86a1d64ac4391030a27aa33ff6ef0fa4ba48d971de99292b32fc8e757ccc1b4b
                                • Instruction ID: f3aaf843d0bc5f20005e7d8d0e5d66c6843ec034b9803c3615f63fb29d7dc5c2
                                • Opcode Fuzzy Hash: 86a1d64ac4391030a27aa33ff6ef0fa4ba48d971de99292b32fc8e757ccc1b4b
                                • Instruction Fuzzy Hash: DB41B0711017009FD722DF24DC94FB67BBCEF55724F140269FAA48A2E1C331A844DB62
                                APIs
                                • ShowWindow.USER32(003B1628,00000000,003B1628,00000000,00000000,003B1628,?,0036DC5D,00000000,?,00000000,00000000,00000000,?,0036DAD1,00000004), ref: 0035E40B
                                • EnableWindow.USER32(00000000,00000000), ref: 0035E42F
                                • ShowWindow.USER32(003B1628,00000000), ref: 0035E48F
                                • ShowWindow.USER32(00000000,00000004), ref: 0035E4A1
                                • EnableWindow.USER32(00000000,00000001), ref: 0035E4C5
                                • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0035E4E8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$Show$Enable$MessageSend
                                • String ID:
                                • API String ID: 642888154-0
                                • Opcode ID: 6166a116aa7cd9677913ee85af97b0335269522418539a867b308162818fa192
                                • Instruction ID: bacce4b40ab5e5c66fde8560cf49806f1311d8539123dac6907a06ca93174a08
                                • Opcode Fuzzy Hash: 6166a116aa7cd9677913ee85af97b0335269522418539a867b308162818fa192
                                • Instruction Fuzzy Hash: E1414970601150EFDB2ACF25C499F947BE1BF09306F5981A9EE5C8F2B2C731A989CB51
                                APIs
                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 003398D1
                                  • Part of subcall function 0030F4EA: std::exception::exception.LIBCMT ref: 0030F51E
                                  • Part of subcall function 0030F4EA: __CxxThrowException@8.LIBCMT ref: 0030F533
                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00339908
                                • EnterCriticalSection.KERNEL32(?), ref: 00339924
                                • LeaveCriticalSection.KERNEL32(?), ref: 0033999E
                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 003399B3
                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 003399D2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                • String ID:
                                • API String ID: 2537439066-0
                                • Opcode ID: d3fc695eefd71282fa6700f240b47f26c82e067ce5d3fcf7c120446d782cd2ee
                                • Instruction ID: 9c3a04f8a13fcab9be1b958f574e5e7fbc78c14c834138a8bbf634549488fd44
                                • Opcode Fuzzy Hash: d3fc695eefd71282fa6700f240b47f26c82e067ce5d3fcf7c120446d782cd2ee
                                • Instruction Fuzzy Hash: BD319031A00105EFDB12AF95DC85A6AB7B8FF45310F1480A9E909AB286D770DA50CBA0
                                APIs
                                • GetForegroundWindow.USER32(?,?,?,?,?,?,003477F4,?,?,00000000,00000001), ref: 00349B53
                                  • Part of subcall function 00346544: GetWindowRect.USER32(?,?), ref: 00346557
                                • GetDesktopWindow.USER32 ref: 00349B7D
                                • GetWindowRect.USER32(00000000), ref: 00349B84
                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00349BB6
                                  • Part of subcall function 00337A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00337AD0
                                • GetCursorPos.USER32(?), ref: 00349BE2
                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00349C44
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                • String ID:
                                • API String ID: 4137160315-0
                                • Opcode ID: ca3d18acd6132cd105bee14d163913a0f809a49972325151fa7a66830dd2393b
                                • Instruction ID: 94f87924260b105d4cb36e208321060dc878ebdf6d0f0c386070f04908cc1419
                                • Opcode Fuzzy Hash: ca3d18acd6132cd105bee14d163913a0f809a49972325151fa7a66830dd2393b
                                • Instruction Fuzzy Hash: 9731CF72104309ABC721DF14D889F9BB7EDFF89314F00091AF589EB181DA31EA44CB92
                                APIs
                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 0032AFAE
                                • OpenProcessToken.ADVAPI32(00000000), ref: 0032AFB5
                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 0032AFC4
                                • CloseHandle.KERNEL32(00000004), ref: 0032AFCF
                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0032AFFE
                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 0032B012
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                • String ID:
                                • API String ID: 1413079979-0
                                • Opcode ID: 656c5c92601200ca0df49d328435017db5751993ddec774b766061149d074fe0
                                • Instruction ID: 9b30d979fd8dc8e71ab6f601e29fdbfb917438d30cf1b31b0f5e4269195fb4b6
                                • Opcode Fuzzy Hash: 656c5c92601200ca0df49d328435017db5751993ddec774b766061149d074fe0
                                • Instruction Fuzzy Hash: 002179B2104619BFDB138FA4EE09FAE7BADAF44304F044015FA05A2161D37A9D60EB61
                                APIs
                                  • Part of subcall function 0030AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0030AFE3
                                  • Part of subcall function 0030AF83: SelectObject.GDI32(?,00000000), ref: 0030AFF2
                                  • Part of subcall function 0030AF83: BeginPath.GDI32(?), ref: 0030B009
                                  • Part of subcall function 0030AF83: SelectObject.GDI32(?,00000000), ref: 0030B033
                                • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0035EC20
                                • LineTo.GDI32(00000000,00000003,?), ref: 0035EC34
                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0035EC42
                                • LineTo.GDI32(00000000,00000000,?), ref: 0035EC52
                                • EndPath.GDI32(00000000), ref: 0035EC62
                                • StrokePath.GDI32(00000000), ref: 0035EC72
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                • String ID:
                                • API String ID: 43455801-0
                                • Opcode ID: 5c0cbbe4d66e6004c6bc263cd7ef95822fc10786df2ede64456146443e7a5a11
                                • Instruction ID: 09d63db30c0877bc2fdfc6d00c1333e435cd5e1faed9f73817137fe792446877
                                • Opcode Fuzzy Hash: 5c0cbbe4d66e6004c6bc263cd7ef95822fc10786df2ede64456146443e7a5a11
                                • Instruction Fuzzy Hash: A711097200014DBFEB129F90DC88EEA7F6DEF08354F048112FE0899160D7719E95DBA0
                                APIs
                                • GetDC.USER32(00000000), ref: 0032E1C0
                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 0032E1D1
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0032E1D8
                                • ReleaseDC.USER32(00000000,00000000), ref: 0032E1E0
                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0032E1F7
                                • MulDiv.KERNEL32(000009EC,?,?), ref: 0032E209
                                  • Part of subcall function 00329AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00329A05,00000000,00000000,?,00329DDB), ref: 0032A53A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CapsDevice$ExceptionRaiseRelease
                                • String ID:
                                • API String ID: 603618608-0
                                • Opcode ID: 3ef473a30f68b5dcd4bca57cba5d3cbe41f6d1e33f3a724cf3b4f818bccb6083
                                • Instruction ID: ebc29d635b6d7d59c0d9b182f5f1734799265801e1ef1329427425b44dcb131c
                                • Opcode Fuzzy Hash: 3ef473a30f68b5dcd4bca57cba5d3cbe41f6d1e33f3a724cf3b4f818bccb6083
                                • Instruction Fuzzy Hash: 990144B5A40715BFEB119BA5DC45F5EBFB9EF48751F004066EA08A7390D6719C01CBA0
                                APIs
                                • __init_pointers.LIBCMT ref: 00317B47
                                  • Part of subcall function 0031123A: __initp_misc_winsig.LIBCMT ref: 0031125E
                                  • Part of subcall function 0031123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00317F51
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00317F65
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00317F78
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00317F8B
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00317F9E
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00317FB1
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00317FC4
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00317FD7
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00317FEA
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00317FFD
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00318010
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00318023
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00318036
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00318049
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0031805C
                                  • Part of subcall function 0031123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 0031806F
                                • __mtinitlocks.LIBCMT ref: 00317B4C
                                  • Part of subcall function 00317E23: InitializeCriticalSectionAndSpinCount.KERNEL32(003AAC68,00000FA0,?,?,00317B51,00315E77,003A6C70,00000014), ref: 00317E41
                                • __mtterm.LIBCMT ref: 00317B55
                                  • Part of subcall function 00317BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00317B5A,00315E77,003A6C70,00000014), ref: 00317D3F
                                  • Part of subcall function 00317BBD: _free.LIBCMT ref: 00317D46
                                  • Part of subcall function 00317BBD: DeleteCriticalSection.KERNEL32(003AAC68,?,?,00317B5A,00315E77,003A6C70,00000014), ref: 00317D68
                                • __calloc_crt.LIBCMT ref: 00317B7A
                                • GetCurrentThreadId.KERNEL32 ref: 00317BA3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                • String ID:
                                • API String ID: 2942034483-0
                                • Opcode ID: f6452e63054ad78ac7331c6b8fb251aaa0f0d1af265018fa41f69605a6325328
                                • Instruction ID: 464bd484354bd9110ea0742ec5381795727e29a2accebfd89fb66ec839e8fc8b
                                • Opcode Fuzzy Hash: f6452e63054ad78ac7331c6b8fb251aaa0f0d1af265018fa41f69605a6325328
                                • Instruction Fuzzy Hash: 92F0623251D61119E66F76747C0B6CA26F89F0A730F298699F864CA1D1EB2588C28161
                                APIs
                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 002F281D
                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 002F2825
                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 002F2830
                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 002F283B
                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 002F2843
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 002F284B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Virtual
                                • String ID:
                                • API String ID: 4278518827-0
                                • Opcode ID: c293b14749ba48efceb0e3cb6ccf7b04aec5d5b84e564f599a8ad7f7fb230620
                                • Instruction ID: 123ea4940450e24f4972ec0f9c961ae3674ef81da5d8f91f88fbb4d76b056cab
                                • Opcode Fuzzy Hash: c293b14749ba48efceb0e3cb6ccf7b04aec5d5b84e564f599a8ad7f7fb230620
                                • Instruction Fuzzy Hash: C80167B0902B5ABDE3008F6A8C85B52FFB8FF19354F00411BA15C47A42C7F5A864CBE5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                • String ID:
                                • API String ID: 1423608774-0
                                • Opcode ID: 57fd52905e04ecd35311d66969e27c827e8551522dee8be88ea9c1e4b0e8f26b
                                • Instruction ID: 7d7ab349875376da41017ba14916b4d6199ae271c46af12d13672a1ade68c09a
                                • Opcode Fuzzy Hash: 57fd52905e04ecd35311d66969e27c827e8551522dee8be88ea9c1e4b0e8f26b
                                • Instruction Fuzzy Hash: 2E018136502211EBD7271B94EC88EEB777DFF88701F05096AF507A64A1DBB49841DB60
                                APIs
                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00337C07
                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00337C1D
                                • GetWindowThreadProcessId.USER32(?,?), ref: 00337C2C
                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00337C3B
                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00337C45
                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00337C4C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                • String ID:
                                • API String ID: 839392675-0
                                • Opcode ID: a765bfab8e8a3913e6825a237cbae4331fa5ee3eecf995871934b69d7781cf17
                                • Instruction ID: fee5727f64c40870e517583515464e366e438b902f1ce624fd758665ee41a9cc
                                • Opcode Fuzzy Hash: a765bfab8e8a3913e6825a237cbae4331fa5ee3eecf995871934b69d7781cf17
                                • Instruction Fuzzy Hash: 74F03A76241158BBE7325B529C0EEEF7B7CEFC6B11F400028FA09A1051D7A05A81C6B5
                                APIs
                                • InterlockedExchange.KERNEL32(?,?), ref: 00339A33
                                • EnterCriticalSection.KERNEL32(?,?,?,?,00365DEE,?,?,?,?,?,002FED63), ref: 00339A44
                                • TerminateThread.KERNEL32(?,000001F6,?,?,?,00365DEE,?,?,?,?,?,002FED63), ref: 00339A51
                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00365DEE,?,?,?,?,?,002FED63), ref: 00339A5E
                                  • Part of subcall function 003393D1: CloseHandle.KERNEL32(?,?,00339A6B,?,?,?,00365DEE,?,?,?,?,?,002FED63), ref: 003393DB
                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00339A71
                                • LeaveCriticalSection.KERNEL32(?,?,?,?,00365DEE,?,?,?,?,?,002FED63), ref: 00339A78
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                • String ID:
                                • API String ID: 3495660284-0
                                • Opcode ID: 48153b85da3949fd5a29c4e55cf646f08750b0c77f3aa415c413c17595d6a4cb
                                • Instruction ID: 4532eba5503dd8b5641d67c98302c902ae1408833e7d1b18abb9db9c913a23f4
                                • Opcode Fuzzy Hash: 48153b85da3949fd5a29c4e55cf646f08750b0c77f3aa415c413c17595d6a4cb
                                • Instruction Fuzzy Hash: 22F05E36141211EBD7231BA4EC89EAB773DFF84301F150966F507A50B1DBB59842DB60
                                APIs
                                  • Part of subcall function 0030F4EA: std::exception::exception.LIBCMT ref: 0030F51E
                                  • Part of subcall function 0030F4EA: __CxxThrowException@8.LIBCMT ref: 0030F533
                                • __swprintf.LIBCMT ref: 002F1EA6
                                Strings
                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 002F1D49
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Exception@8Throw__swprintfstd::exception::exception
                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                • API String ID: 2125237772-557222456
                                • Opcode ID: 56343d675d9d8b79f09c5b0d30f63039144f1f64a694b2373adb715b52c0b9a5
                                • Instruction ID: 21b24bd0a655aea007021a80056f16289929b8911621b0831b1620bdfa6805ea
                                • Opcode Fuzzy Hash: 56343d675d9d8b79f09c5b0d30f63039144f1f64a694b2373adb715b52c0b9a5
                                • Instruction Fuzzy Hash: F5918E711242099FC716EF24C895C7AF7A4FF95780F40492DFA869B2A1DB70ED24CB52
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 0034B006
                                • CharUpperBuffW.USER32(?,?), ref: 0034B115
                                • VariantClear.OLEAUT32(?), ref: 0034B298
                                  • Part of subcall function 00339DC5: VariantInit.OLEAUT32(00000000), ref: 00339E05
                                  • Part of subcall function 00339DC5: VariantCopy.OLEAUT32(?,?), ref: 00339E0E
                                  • Part of subcall function 00339DC5: VariantClear.OLEAUT32(?), ref: 00339E1A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                • API String ID: 4237274167-1221869570
                                • Opcode ID: 0025a542fd46167954f9bae096e14432b894158c10a6cd553b568bcb44228f89
                                • Instruction ID: 4a5383933b4daec246f2934a76b0a22bf303fddb282cbbb72464ac1b31c15411
                                • Opcode Fuzzy Hash: 0025a542fd46167954f9bae096e14432b894158c10a6cd553b568bcb44228f89
                                • Instruction Fuzzy Hash: 02918A306083059FCB11DF24C48196AFBF8EF89744F14486EF98A9B3A2DB31E945CB52
                                APIs
                                  • Part of subcall function 0030C6F4: _wcscpy.LIBCMT ref: 0030C717
                                • _memset.LIBCMT ref: 00335438
                                • GetMenuItemInfoW.USER32(?), ref: 00335467
                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00335513
                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0033553D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                • String ID: 0
                                • API String ID: 4152858687-4108050209
                                • Opcode ID: e8ce3ae46796bc94974698af9579f0a78bd54171c3461d0fb5857ce7f9198d7d
                                • Instruction ID: 30bdaa48fc7e148d791dfa1882d78908f60a7bf34b0a64031cb393a03a4364cf
                                • Opcode Fuzzy Hash: e8ce3ae46796bc94974698af9579f0a78bd54171c3461d0fb5857ce7f9198d7d
                                • Instruction Fuzzy Hash: 6D5125721147019BE7179F28C8C17BBB7E8EF86364F150A2DF996D31A0DBA0DD848B52
                                APIs
                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0033027B
                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 003302B1
                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 003302C2
                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00330344
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorMode$AddressCreateInstanceProc
                                • String ID: DllGetClassObject
                                • API String ID: 753597075-1075368562
                                • Opcode ID: 529eae04f47c29cbf83a73031fe2d9123283c9613421111f0b8957a3457a54d7
                                • Instruction ID: 7078c6b5bfb73f40c165964c80cedd181889219c76f24799dfb3dff23bfa54e3
                                • Opcode Fuzzy Hash: 529eae04f47c29cbf83a73031fe2d9123283c9613421111f0b8957a3457a54d7
                                • Instruction Fuzzy Hash: 71416D75600204EFDB1ACF64C8E4B9A7BB9EF45320F1580A9ED09DF206D7B5DA44CBA1
                                APIs
                                • _memset.LIBCMT ref: 00335075
                                • GetMenuItemInfoW.USER32 ref: 00335091
                                • DeleteMenu.USER32(00000004,00000007,00000000), ref: 003350D7
                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,003B1708,00000000), ref: 00335120
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Menu$Delete$InfoItem_memset
                                • String ID: 0
                                • API String ID: 1173514356-4108050209
                                • Opcode ID: a6fb9ee4865f0c2dc1ed37eb45492e16ad79380d348effffc52ee20afffa1cb6
                                • Instruction ID: 9e6da3432b58baa91d27ecdb4e6801d1b5f8299ac024f334a0889d814febbe87
                                • Opcode Fuzzy Hash: a6fb9ee4865f0c2dc1ed37eb45492e16ad79380d348effffc52ee20afffa1cb6
                                • Instruction Fuzzy Hash: 5241E371604701AFDB26DF24DCC0F6AB7E8AF85324F04461EF9959B291D730E940CB62
                                APIs
                                • CharLowerBuffW.USER32(?,?,?,?), ref: 00350587
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: BuffCharLower
                                • String ID: cdecl$none$stdcall$winapi
                                • API String ID: 2358735015-567219261
                                • Opcode ID: f5c38bfb2cb795aac078132b0594d5b305978948b5b76464c1aba85aea6dbd01
                                • Instruction ID: 8e71f8fd65d3811e5ef5fa43222dc5ab922913182b0d05cb1966fd11f97270df
                                • Opcode Fuzzy Hash: f5c38bfb2cb795aac078132b0594d5b305978948b5b76464c1aba85aea6dbd01
                                • Instruction Fuzzy Hash: EA31D23460021AAFCF06EF54C951DFEB3B4FF55314B104A29E826AB6E1DB72E915CB80
                                APIs
                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 0032B88E
                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 0032B8A1
                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 0032B8D1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: ComboBox$ListBox
                                • API String ID: 3850602802-1403004172
                                • Opcode ID: 5d4987bd1571fbcebf585cc22b276257d704d4daf80f078df2812db631259033
                                • Instruction ID: a8936f327ab1aff28cdfedfb2b2ba86a8bf7c83eb0ec23162be64f91f121daa8
                                • Opcode Fuzzy Hash: 5d4987bd1571fbcebf585cc22b276257d704d4daf80f078df2812db631259033
                                • Instruction Fuzzy Hash: F921F376900108BFDB16AB64EC86DFEB77CDF06354B604129F129A71E0DB744D069B60
                                APIs
                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00344401
                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00344427
                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00344457
                                • InternetCloseHandle.WININET(00000000), ref: 0034449E
                                  • Part of subcall function 00345052: GetLastError.KERNEL32(?,?,003443CC,00000000,00000000,00000001), ref: 00345067
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                • String ID:
                                • API String ID: 1951874230-3916222277
                                • Opcode ID: 14525c09806ae5ef577859307cfedcdc6aba1357cdbfe119ed3a0602913ccc0a
                                • Instruction ID: 50ed70398fd99d5872b0c3245c8fc40c25418649f261911f7e14959c92007853
                                • Opcode Fuzzy Hash: 14525c09806ae5ef577859307cfedcdc6aba1357cdbfe119ed3a0602913ccc0a
                                • Instruction Fuzzy Hash: 2B2192B5500608BFE7239F65CC85FBFB6FCEF48754F10802AF509AA240DA64AD459770
                                APIs
                                  • Part of subcall function 0030D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0030D1BA
                                  • Part of subcall function 0030D17C: GetStockObject.GDI32(00000011), ref: 0030D1CE
                                  • Part of subcall function 0030D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0030D1D8
                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 0035915C
                                • LoadLibraryW.KERNEL32(?), ref: 00359163
                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00359178
                                • DestroyWindow.USER32(?), ref: 00359180
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                • String ID: SysAnimate32
                                • API String ID: 4146253029-1011021900
                                • Opcode ID: 9ba95c12337aa10a0785c3c6b9e2a074388548c303cbc8f699a7468443fa37b0
                                • Instruction ID: 081ffca7663f1b664a0436e8e5ea61796aefa6204586f502cdea56e55ce3c8b1
                                • Opcode Fuzzy Hash: 9ba95c12337aa10a0785c3c6b9e2a074388548c303cbc8f699a7468443fa37b0
                                • Instruction Fuzzy Hash: 1B21DB71200616FBEF224E649C88FBB33ADEF99365F11061AFD14961A0C735CD46A760
                                APIs
                                • GetStdHandle.KERNEL32(0000000C), ref: 00339588
                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003395B9
                                • GetStdHandle.KERNEL32(0000000C), ref: 003395CB
                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00339605
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CreateHandle$FilePipe
                                • String ID: nul
                                • API String ID: 4209266947-2873401336
                                • Opcode ID: ca045a9fe215335c3f3f6328a96abe83efe78b1e36cbd2c2b59aca244fa1e256
                                • Instruction ID: cd1821d2ce352aa0d2fa613b025a8bca750327f71adc84155df4d710af963b8a
                                • Opcode Fuzzy Hash: ca045a9fe215335c3f3f6328a96abe83efe78b1e36cbd2c2b59aca244fa1e256
                                • Instruction Fuzzy Hash: D0216271500205EBEB229F25DC85B9A77FCEF46720F204A1AF9A5D72D0D7B0D985CB10
                                APIs
                                • GetStdHandle.KERNEL32(000000F6), ref: 00339653
                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00339683
                                • GetStdHandle.KERNEL32(000000F6), ref: 00339694
                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 003396CE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CreateHandle$FilePipe
                                • String ID: nul
                                • API String ID: 4209266947-2873401336
                                • Opcode ID: 909cef07bfb866e6c31b2599ab2dd851c5bee2cb74bd09f67f6ffb9459837e57
                                • Instruction ID: f716fe3a8095cc2f8ececa3b766a9b541b85c809e30826139e78e7abecca2692
                                • Opcode Fuzzy Hash: 909cef07bfb866e6c31b2599ab2dd851c5bee2cb74bd09f67f6ffb9459837e57
                                • Instruction Fuzzy Hash: DF214171601205DBDB229F699C86F9A77FCAF95734F200A1AF8A1E72D0D7B09845CB50
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0033DB0A
                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0033DB5E
                                • __swprintf.LIBCMT ref: 0033DB77
                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,0038DC00), ref: 0033DBB5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorMode$InformationVolume__swprintf
                                • String ID: %lu
                                • API String ID: 3164766367-685833217
                                • Opcode ID: dbceea8efcc546b4c24106acc425e2fa226de318014b3b1b25c2e92a73c58b3b
                                • Instruction ID: 2a7ed0f3673ee3c24b71a51134a24da39454ce59b007ca233fb9e392d86b415f
                                • Opcode Fuzzy Hash: dbceea8efcc546b4c24106acc425e2fa226de318014b3b1b25c2e92a73c58b3b
                                • Instruction Fuzzy Hash: BA214135600108AFCB11EF64D985DEEBBB8EF49704F104069F609EB251DB71EA41CB61
                                APIs
                                  • Part of subcall function 0032C82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0032C84A
                                  • Part of subcall function 0032C82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 0032C85D
                                  • Part of subcall function 0032C82D: GetCurrentThreadId.KERNEL32 ref: 0032C864
                                  • Part of subcall function 0032C82D: AttachThreadInput.USER32(00000000), ref: 0032C86B
                                • GetFocus.USER32 ref: 0032CA05
                                  • Part of subcall function 0032C876: GetParent.USER32(?), ref: 0032C884
                                • GetClassNameW.USER32(?,?,00000100), ref: 0032CA4E
                                • EnumChildWindows.USER32(?,0032CAC4), ref: 0032CA76
                                • __swprintf.LIBCMT ref: 0032CA90
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                • String ID: %s%d
                                • API String ID: 3187004680-1110647743
                                • Opcode ID: 9d56714e6ffb9ae55838593e0698e4c593d3d7758fbb24a8d642781e8d375a86
                                • Instruction ID: 28428b57bfd56b031b011d1ad67eb4ed1b8ab284f9bcff96f64f8ecff5f38738
                                • Opcode Fuzzy Hash: 9d56714e6ffb9ae55838593e0698e4c593d3d7758fbb24a8d642781e8d375a86
                                • Instruction Fuzzy Hash: 7111B1716202197BCB12BFA0EC89FEE777CAF54700F009066FE08AA182DB709945CB71
                                APIs
                                • __lock.LIBCMT ref: 00317AD8
                                  • Part of subcall function 00317CF4: __mtinitlocknum.LIBCMT ref: 00317D06
                                  • Part of subcall function 00317CF4: EnterCriticalSection.KERNEL32(00000000,?,00317ADD,0000000D), ref: 00317D1F
                                • InterlockedIncrement.KERNEL32(?), ref: 00317AE5
                                • __lock.LIBCMT ref: 00317AF9
                                • ___addlocaleref.LIBCMT ref: 00317B17
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                • String ID: `7
                                • API String ID: 1687444384-4141358569
                                • Opcode ID: 30f34593c02a7fab6bf838edea6894ed24d33132d80d191651be5380df8e3c40
                                • Instruction ID: 478f368f680685fe1018f392b824018abeb0062d21c7263d77506f22cd9a2571
                                • Opcode Fuzzy Hash: 30f34593c02a7fab6bf838edea6894ed24d33132d80d191651be5380df8e3c40
                                • Instruction Fuzzy Hash: 60016175408B009FD736DF75D906789F7F0EF48325F24890EE49A9B6A0CBB4A680CB51
                                APIs
                                • _memset.LIBCMT ref: 0035E33D
                                • _memset.LIBCMT ref: 0035E34C
                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,003B3D00,003B3D44), ref: 0035E37B
                                • CloseHandle.KERNEL32 ref: 0035E38D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _memset$CloseCreateHandleProcess
                                • String ID: D=;
                                • API String ID: 3277943733-1395744148
                                • Opcode ID: 1dab7300be7a4f4b4df68cb55c5c0965c1a69fdda583679455b4cb1a2ede72f9
                                • Instruction ID: fd2e48958d436a236d5b90920683ca1c62d219c72cae76ba88dcf6e4f1df7cd7
                                • Opcode Fuzzy Hash: 1dab7300be7a4f4b4df68cb55c5c0965c1a69fdda583679455b4cb1a2ede72f9
                                • Instruction Fuzzy Hash: B6F082F5540324BEF3121B60AC55FB77E6CDB08B58F004925FF08DA1A2D3759E4086A8
                                APIs
                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 003519F3
                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00351A26
                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00351B49
                                • CloseHandle.KERNEL32(?), ref: 00351BBF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                • String ID:
                                • API String ID: 2364364464-0
                                • Opcode ID: bcb1ec923b996d57b7bd10b6fce8a367dec4d658d84df4414682baaca6782c8f
                                • Instruction ID: 2121731453fa61b3f0e9a8ce4353dc19fa0fa55912bf97328f35088609c8caa1
                                • Opcode Fuzzy Hash: bcb1ec923b996d57b7bd10b6fce8a367dec4d658d84df4414682baaca6782c8f
                                • Instruction Fuzzy Hash: BA817270601204ABDF22EF64C896FAEBBE5AF04720F158459F905AF3D2D7B4A945CF90
                                APIs
                                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0035E1D5
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0035E20D
                                • IsDlgButtonChecked.USER32(?,00000001), ref: 0035E248
                                • GetWindowLongW.USER32(?,000000EC), ref: 0035E269
                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0035E281
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$ButtonCheckedLongWindow
                                • String ID:
                                • API String ID: 3188977179-0
                                • Opcode ID: 5e8e8da357135ea102a05b1d4ed781fc6d148223b69d3affe2266c0b69499a13
                                • Instruction ID: 4d717085eded0dd7139a269af8aef820df77a131737593226c2d8846aa6ee456
                                • Opcode Fuzzy Hash: 5e8e8da357135ea102a05b1d4ed781fc6d148223b69d3affe2266c0b69499a13
                                • Instruction Fuzzy Hash: 0161BF34A00604AFDB2ADF58C894FEAB7BAEF49301F154059FD599B2B1C771AB48CB50
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 00331CB4
                                • VariantClear.OLEAUT32(00000013), ref: 00331D26
                                • VariantClear.OLEAUT32(00000000), ref: 00331D81
                                • VariantClear.OLEAUT32(?), ref: 00331DF8
                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00331E26
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Variant$Clear$ChangeInitType
                                • String ID:
                                • API String ID: 4136290138-0
                                • Opcode ID: 5fc7332eda38641df6dc702a57493f57fdf2dc1b1ac2f3102f1be2e908cf723d
                                • Instruction ID: 018145a7892dae292d971457296e722d9d3952f84ba3a6f2ad531f8ce5ffe10b
                                • Opcode Fuzzy Hash: 5fc7332eda38641df6dc702a57493f57fdf2dc1b1ac2f3102f1be2e908cf723d
                                • Instruction Fuzzy Hash: 7F5137B5A00209AFDB25CF58C880AAAB7B8FF4D314F158559E959DB301E730EA51CFA0
                                APIs
                                  • Part of subcall function 002F936C: __swprintf.LIBCMT ref: 002F93AB
                                  • Part of subcall function 002F936C: __itow.LIBCMT ref: 002F93DF
                                • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 003506EE
                                • GetProcAddress.KERNEL32(00000000,?), ref: 0035077D
                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0035079B
                                • GetProcAddress.KERNEL32(00000000,?), ref: 003507E1
                                • FreeLibrary.KERNEL32(00000000,00000004), ref: 003507FB
                                  • Part of subcall function 0030E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,0033A574,?,?,00000000,00000008), ref: 0030E675
                                  • Part of subcall function 0030E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,0033A574,?,?,00000000,00000008), ref: 0030E699
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                • String ID:
                                • API String ID: 327935632-0
                                • Opcode ID: 0914e377ca240c0a85b8c553a2f0e82f144ead61a872f35bae12891b8f6b8caa
                                • Instruction ID: 74ee174c19ba4555b11dfc24f369ef934cc3c0732de6e3fb5b6f5342c2302355
                                • Opcode Fuzzy Hash: 0914e377ca240c0a85b8c553a2f0e82f144ead61a872f35bae12891b8f6b8caa
                                • Instruction Fuzzy Hash: 7F512775A00209DFCB05EFA8C591DADF7B9BF48310B158065EA56AB362DB31ED45CF80
                                APIs
                                  • Part of subcall function 00353C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00352BB5,?,?), ref: 00353C1D
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00352EEF
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00352F2E
                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00352F75
                                • RegCloseKey.ADVAPI32(?,?), ref: 00352FA1
                                • RegCloseKey.ADVAPI32(00000000), ref: 00352FAE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                • String ID:
                                • API String ID: 3740051246-0
                                • Opcode ID: ca467e29f95d49f89200672e85f094eaf9fea21feb5f1f431f0a26ae9650f299
                                • Instruction ID: 6bf0e2483da9d56220f647bf9a2ff9053e4918fac8dd446242c887e6a8b9783e
                                • Opcode Fuzzy Hash: ca467e29f95d49f89200672e85f094eaf9fea21feb5f1f431f0a26ae9650f299
                                • Instruction Fuzzy Hash: 5A514A71218208AFD705EF54C881E6BB7F9FF88344F10482DFA959B2A1DB30E918CB52
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e31ce84001e213afd7e5c5bef26b61cbfc99b1f9b3cf371b01217504d6cd0d57
                                • Instruction ID: a0e83aeb9f7153ecfbbcc2d607c52cc9e64cf404fa9988160917f8bceff2b19a
                                • Opcode Fuzzy Hash: e31ce84001e213afd7e5c5bef26b61cbfc99b1f9b3cf371b01217504d6cd0d57
                                • Instruction Fuzzy Hash: 6241D439910304AFC722DB28CC45FA9BBB8EB0931AF161225ED19E72F1C630AD45CA90
                                APIs
                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 003412B4
                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 003412DD
                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0034131C
                                  • Part of subcall function 002F936C: __swprintf.LIBCMT ref: 002F93AB
                                  • Part of subcall function 002F936C: __itow.LIBCMT ref: 002F93DF
                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00341341
                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00341349
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                • String ID:
                                • API String ID: 1389676194-0
                                • Opcode ID: 050700970fb07c5c90c8690f0b950a11d486b1c25d15a1afffa6d965f1919ad8
                                • Instruction ID: 16d2e25299fc894d84665a1698bb29bcde7707cd49b6dbfe235d2ea263ce9e2a
                                • Opcode Fuzzy Hash: 050700970fb07c5c90c8690f0b950a11d486b1c25d15a1afffa6d965f1919ad8
                                • Instruction Fuzzy Hash: B8410C35600509DFDB01EF64C991AAEBBF5FF08314B1480A9E90AAB3A2CB31ED51DF50
                                APIs
                                • GetCursorPos.USER32(000000FF), ref: 0030B64F
                                • ScreenToClient.USER32(00000000,000000FF), ref: 0030B66C
                                • GetAsyncKeyState.USER32(00000001), ref: 0030B691
                                • GetAsyncKeyState.USER32(00000002), ref: 0030B69F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AsyncState$ClientCursorScreen
                                • String ID:
                                • API String ID: 4210589936-0
                                • Opcode ID: f07edfd9c86dd71d9c999b75ed9996ad819a40738ccbdc1325f109e3bb538cd6
                                • Instruction ID: fef4a9988ba36ea56749354dbe371799a65523385324040eb502307a9e62b7ea
                                • Opcode Fuzzy Hash: f07edfd9c86dd71d9c999b75ed9996ad819a40738ccbdc1325f109e3bb538cd6
                                • Instruction Fuzzy Hash: A5415035A05119BBDF169F64C854EE9FB74BF05324F108319E829AA2D0CB31A994DF91
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 0032B369
                                • PostMessageW.USER32(?,00000201,00000001), ref: 0032B413
                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 0032B41B
                                • PostMessageW.USER32(?,00000202,00000000), ref: 0032B429
                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 0032B431
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessagePostSleep$RectWindow
                                • String ID:
                                • API String ID: 3382505437-0
                                • Opcode ID: 5d884d793f96e00428ee9bbe109997bba323692a0c9f02020838a459e80b0d42
                                • Instruction ID: 41170a3c4b4b583debcaca07fa1e75c661aab50f19f21b696e2db1c98782c012
                                • Opcode Fuzzy Hash: 5d884d793f96e00428ee9bbe109997bba323692a0c9f02020838a459e80b0d42
                                • Instruction Fuzzy Hash: AD31A071900229EBDF15CF68ED4DA9E7BB9EF04325F114229F925AA1D1C3B09954CB90
                                APIs
                                • IsWindowVisible.USER32(?), ref: 0032DBD7
                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0032DBF4
                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0032DC2C
                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0032DC52
                                • _wcsstr.LIBCMT ref: 0032DC5C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                • String ID:
                                • API String ID: 3902887630-0
                                • Opcode ID: 285870adbfb96ce5260bbe8c3086ada9e8a2fb5650dc96b10308e17017d3ca14
                                • Instruction ID: d5e96685d7ddc410a93850b727e1ff1bd8abd9fa251e8df002e4491795855fb2
                                • Opcode Fuzzy Hash: 285870adbfb96ce5260bbe8c3086ada9e8a2fb5650dc96b10308e17017d3ca14
                                • Instruction Fuzzy Hash: BE21F971204124BFEB275F39EC59E7B7BACDF45760F114039F809DA191EAA1DC41D6A0
                                APIs
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0032BC90
                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0032BCC2
                                • __itow.LIBCMT ref: 0032BCDA
                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0032BD00
                                • __itow.LIBCMT ref: 0032BD11
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$__itow
                                • String ID:
                                • API String ID: 3379773720-0
                                • Opcode ID: 1a526e6589ce7c149bec75c0132073b7c3f0d847929f05938abcd9f047024cbc
                                • Instruction ID: e24336fa6a7176a5f01f453aecc56558e6872b064cef04ce40f3b0d6e80f45d7
                                • Opcode Fuzzy Hash: 1a526e6589ce7c149bec75c0132073b7c3f0d847929f05938abcd9f047024cbc
                                • Instruction Fuzzy Hash: 3021C6356006287BDB22AE659C46FDFFB7DEF4A750F400025FA09EB181DB70894587A1
                                APIs
                                  • Part of subcall function 002F50E6: _wcsncpy.LIBCMT ref: 002F50FA
                                • GetFileAttributesW.KERNEL32(?,?,?,?,003360C3), ref: 00336369
                                • GetLastError.KERNEL32(?,?,?,003360C3), ref: 00336374
                                • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,003360C3), ref: 00336388
                                • _wcsrchr.LIBCMT ref: 003363AA
                                  • Part of subcall function 00336318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,003360C3), ref: 003363E0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                • String ID:
                                • API String ID: 3633006590-0
                                • Opcode ID: 5bc2742d7fed24bda1a70e6304fdfa78263c4972729af4993b15e0768b51012b
                                • Instruction ID: 7b08b0bfb77e969b58fcca15509855eabbefc2fdf99cc7aba648f5177d6151af
                                • Opcode Fuzzy Hash: 5bc2742d7fed24bda1a70e6304fdfa78263c4972729af4993b15e0768b51012b
                                • Instruction Fuzzy Hash: A721D8355152156FDB27AB74AC93FEA23ACEF093B0F108469F045DB0E1EF60D9C18A55
                                APIs
                                  • Part of subcall function 0034A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0034A84E
                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00348BD3
                                • WSAGetLastError.WSOCK32(00000000), ref: 00348BE2
                                • connect.WSOCK32(00000000,?,00000010), ref: 00348BFE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorLastconnectinet_addrsocket
                                • String ID:
                                • API String ID: 3701255441-0
                                • Opcode ID: 320a295d2c3fdea2d851d4ea5e85670f0f1a4b2dc47346a1a29b210b3764245e
                                • Instruction ID: 8c418420bb511f4d94219a85a244f18b3c276fb842fb6b60b5db62564a774c9e
                                • Opcode Fuzzy Hash: 320a295d2c3fdea2d851d4ea5e85670f0f1a4b2dc47346a1a29b210b3764245e
                                • Instruction Fuzzy Hash: F5218C312002149FDB16AF68C88AF7EB7EDEF48760F044459F916AF2D2CB74AC418B61
                                APIs
                                • IsWindow.USER32(00000000), ref: 00348441
                                • GetForegroundWindow.USER32 ref: 00348458
                                • GetDC.USER32(00000000), ref: 00348494
                                • GetPixel.GDI32(00000000,?,00000003), ref: 003484A0
                                • ReleaseDC.USER32(00000000,00000003), ref: 003484DB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$ForegroundPixelRelease
                                • String ID:
                                • API String ID: 4156661090-0
                                • Opcode ID: 8223571edd2b235fe6605e2a6f893c1906d6882a76983e306b356d8076c5f155
                                • Instruction ID: ff1e34c80baaeea4eb345d8932b7c6f0b3d2a0c8042323fd44b105b21a109cb8
                                • Opcode Fuzzy Hash: 8223571edd2b235fe6605e2a6f893c1906d6882a76983e306b356d8076c5f155
                                • Instruction Fuzzy Hash: F021A435A00204AFD711EFA5C885A6EB7F9EF48301F048479E9499B351DF70AC40CB50
                                APIs
                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0030AFE3
                                • SelectObject.GDI32(?,00000000), ref: 0030AFF2
                                • BeginPath.GDI32(?), ref: 0030B009
                                • SelectObject.GDI32(?,00000000), ref: 0030B033
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ObjectSelect$BeginCreatePath
                                • String ID:
                                • API String ID: 3225163088-0
                                • Opcode ID: d77d6565d8fe7e211942d319e817524bce0ee6c81f625fc68a9d4fb6f6470cbc
                                • Instruction ID: 1107d73165b5f744f3d6587f8b4e16310316d85d0ffb36ca43a2681b187d76e4
                                • Opcode Fuzzy Hash: d77d6565d8fe7e211942d319e817524bce0ee6c81f625fc68a9d4fb6f6470cbc
                                • Instruction Fuzzy Hash: 682180B1801309EFDB23DF59EC687AA7B7CBB10759F54432AE925A61E0D3704885CF91
                                APIs
                                • __calloc_crt.LIBCMT ref: 003121A9
                                • CreateThread.KERNEL32(?,?,003122DF,00000000,?,?), ref: 003121ED
                                • GetLastError.KERNEL32 ref: 003121F7
                                • _free.LIBCMT ref: 00312200
                                • __dosmaperr.LIBCMT ref: 0031220B
                                  • Part of subcall function 00317C0E: __getptd_noexit.LIBCMT ref: 00317C0E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                • String ID:
                                • API String ID: 2664167353-0
                                • Opcode ID: 706920b7ecdedf30aa82e698880a964b2e25b6ef084581e4a5835e60b50d77b7
                                • Instruction ID: 6091ab3257215c205a1ea482fd67d46c1836faf386f680a4676f38c012a41574
                                • Opcode Fuzzy Hash: 706920b7ecdedf30aa82e698880a964b2e25b6ef084581e4a5835e60b50d77b7
                                • Instruction Fuzzy Hash: 2A11E5321043066FAB2BAFA49C42DDF3BA8EF0C760B150429F9148A141DB31C8E186A0
                                APIs
                                • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0032ABD7
                                • GetLastError.KERNEL32(?,0032A69F,?,?,?), ref: 0032ABE1
                                • GetProcessHeap.KERNEL32(00000008,?,?,0032A69F,?,?,?), ref: 0032ABF0
                                • HeapAlloc.KERNEL32(00000000,?,0032A69F,?,?,?), ref: 0032ABF7
                                • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0032AC0E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                • String ID:
                                • API String ID: 842720411-0
                                • Opcode ID: 8ab0f63cd9f99f53f80800ecdb043572c6b096b5f1700a5442b41a1a9101f383
                                • Instruction ID: 4f031ccae8491bd78f2bb4463e34e033249350b075d5f3ed63075f16b06cc335
                                • Opcode Fuzzy Hash: 8ab0f63cd9f99f53f80800ecdb043572c6b096b5f1700a5442b41a1a9101f383
                                • Instruction Fuzzy Hash: 90013171200224BFDB224FA9EC48D6B7BBDEF89755B110429F549D3250DA71DC80CF61
                                APIs
                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00337A74
                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00337A82
                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00337A8A
                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00337A94
                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00337AD0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                • String ID:
                                • API String ID: 2833360925-0
                                • Opcode ID: 04b9de4f0e6504cb9dc6e1ced629bfcd4113a1eb62cd94b9ef79c198a7c892f0
                                • Instruction ID: f74c26b2779e271aab1137e267709a758d4c3a2cb03158849394ae897d1caecd
                                • Opcode Fuzzy Hash: 04b9de4f0e6504cb9dc6e1ced629bfcd4113a1eb62cd94b9ef79c198a7c892f0
                                • Instruction Fuzzy Hash: 820129B1C04619EBCF22AFE4DC98AEDBB78FF08711F410455E502B2254DB309690C7A1
                                APIs
                                • CLSIDFromProgID.OLE32 ref: 00329ADC
                                • ProgIDFromCLSID.OLE32(?,00000000), ref: 00329AF7
                                • lstrcmpiW.KERNEL32(?,00000000), ref: 00329B05
                                • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00329B15
                                • CLSIDFromString.OLE32(?,?), ref: 00329B21
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                • String ID:
                                • API String ID: 3897988419-0
                                • Opcode ID: e33ae97d771ec20a45b85a453dfbbe525aa33aac498e4e26220fb016aa2df0f8
                                • Instruction ID: 3cf12eb53dd77b40d02e3aaf3f3b54d915edd70688960ecd36d556fb829b3b79
                                • Opcode Fuzzy Hash: e33ae97d771ec20a45b85a453dfbbe525aa33aac498e4e26220fb016aa2df0f8
                                • Instruction Fuzzy Hash: D301A276A00224BFDB224F54EC44B9A7BFDEF48751F144029F90AD6210D771DD409BA0
                                APIs
                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0032AA79
                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0032AA83
                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0032AA92
                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0032AA99
                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0032AAAF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                • String ID:
                                • API String ID: 44706859-0
                                • Opcode ID: 8b2e63543b13c125f9774d58216173146ba580a6eece59e6ffb5d4456b7496ca
                                • Instruction ID: 7be0aaa2b9a82da87bccffcb100e32553842a79bcc482c22734408d75344b622
                                • Opcode Fuzzy Hash: 8b2e63543b13c125f9774d58216173146ba580a6eece59e6ffb5d4456b7496ca
                                • Instruction Fuzzy Hash: 41F04F75210214AFEB225FA4AC89F673BBCFF49754F100429F945D7190DB619C82CA61
                                APIs
                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0032AADA
                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0032AAE4
                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0032AAF3
                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0032AAFA
                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0032AB10
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                • String ID:
                                • API String ID: 44706859-0
                                • Opcode ID: db5757f22a4843210951cb78625fe93654f743fb7655a3ed599af8004bd16e65
                                • Instruction ID: a366436990be8a6784038a5fc2a5a64c8e67fc04c9acad88ea256c40ec06c63d
                                • Opcode Fuzzy Hash: db5757f22a4843210951cb78625fe93654f743fb7655a3ed599af8004bd16e65
                                • Instruction Fuzzy Hash: 2AF04F75200318AFEB220FA4EC88F673B7DFF46B54F100029F946D7190CA619841CA61
                                APIs
                                • GetDlgItem.USER32(?,000003E9), ref: 0032EC94
                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 0032ECAB
                                • MessageBeep.USER32(00000000), ref: 0032ECC3
                                • KillTimer.USER32(?,0000040A), ref: 0032ECDF
                                • EndDialog.USER32(?,00000001), ref: 0032ECF9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                • String ID:
                                • API String ID: 3741023627-0
                                • Opcode ID: 397189711e76ffb0403e17bbe115cf742f745a96254dee17dfd8d8e4ab76dcef
                                • Instruction ID: d22f18a39651967f5b57eca2d65fc2cd6bcd931dbe002b84f4e4ec5568b5cb91
                                • Opcode Fuzzy Hash: 397189711e76ffb0403e17bbe115cf742f745a96254dee17dfd8d8e4ab76dcef
                                • Instruction Fuzzy Hash: 9D016D30500724ABEB365B50EE5EB9677BCFF00B05F000559E686A54E0DBF0AA848B80
                                APIs
                                • EndPath.GDI32(?), ref: 0030B0BA
                                • StrokeAndFillPath.GDI32(?,?,0036E680,00000000,?,?,?), ref: 0030B0D6
                                • SelectObject.GDI32(?,00000000), ref: 0030B0E9
                                • DeleteObject.GDI32 ref: 0030B0FC
                                • StrokePath.GDI32(?), ref: 0030B117
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                • String ID:
                                • API String ID: 2625713937-0
                                • Opcode ID: 8a3c87dd11baff899aeacb43567a86748f9e55558f0973ca0ac29cce595785a6
                                • Instruction ID: dbd016610a57b0ded62d75c0d13e21f272b33861758f080123a01ff9fa3ef7f7
                                • Opcode Fuzzy Hash: 8a3c87dd11baff899aeacb43567a86748f9e55558f0973ca0ac29cce595785a6
                                • Instruction Fuzzy Hash: 07F0C431001248EFDB379F69EC2D7A57B79EB1036AF888315E929951F0C73189A6DF50
                                APIs
                                • CoInitialize.OLE32(00000000), ref: 0033F2DA
                                • CoCreateInstance.OLE32(0037DA7C,00000000,00000001,0037D8EC,?), ref: 0033F2F2
                                • CoUninitialize.OLE32 ref: 0033F555
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CreateInitializeInstanceUninitialize
                                • String ID: .lnk
                                • API String ID: 948891078-24824748
                                • Opcode ID: bdbbcccfb719b8b402e01d362e659c1b55ff294889cc893e91925e4f6cbf31c2
                                • Instruction ID: 34d0e4e602cb85e83b41c0d1c46adb187a0acfa18f918b8114ef3460c6bfb15b
                                • Opcode Fuzzy Hash: bdbbcccfb719b8b402e01d362e659c1b55ff294889cc893e91925e4f6cbf31c2
                                • Instruction Fuzzy Hash: F0A15C71114205AFD301EF64C895EAFB7ECEF98314F00492DF2559B2A2EB70EA49CB52
                                APIs
                                  • Part of subcall function 002F660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002F53B1,?,?,002F61FF,?,00000000,00000001,00000000), ref: 002F662F
                                • CoInitialize.OLE32(00000000), ref: 0033E85D
                                • CoCreateInstance.OLE32(0037DA7C,00000000,00000001,0037D8EC,?), ref: 0033E876
                                • CoUninitialize.OLE32 ref: 0033E893
                                  • Part of subcall function 002F936C: __swprintf.LIBCMT ref: 002F93AB
                                  • Part of subcall function 002F936C: __itow.LIBCMT ref: 002F93DF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                • String ID: .lnk
                                • API String ID: 2126378814-24824748
                                • Opcode ID: 102b318cc5c76d6b6febf749f6f1f8385e947fed3c3c9ac5f4e52a58d995cb6d
                                • Instruction ID: b02f44d5aa611bacad6198f662e4bc91ef003c3e7f243db639f56b761496af81
                                • Opcode Fuzzy Hash: 102b318cc5c76d6b6febf749f6f1f8385e947fed3c3c9ac5f4e52a58d995cb6d
                                • Instruction Fuzzy Hash: D6A154356043059FCB11DF14C884E6ABBE5BF88720F158998F99A9B3A1CB31EC45CF81
                                APIs
                                • __startOneArgErrorHandling.LIBCMT ref: 003132ED
                                  • Part of subcall function 0031E0D0: __87except.LIBCMT ref: 0031E10B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorHandling__87except__start
                                • String ID: pow
                                • API String ID: 2905807303-2276729525
                                • Opcode ID: dfc550664b7ac293968bba671dff5ac5b54cd72bcad22fb885e2593dbbb495cf
                                • Instruction ID: f7d19fb64a56bc2007b74ff52d32702b9d36c810ebbce3153ab2843d3d211bb9
                                • Opcode Fuzzy Hash: dfc550664b7ac293968bba671dff5ac5b54cd72bcad22fb885e2593dbbb495cf
                                • Instruction Fuzzy Hash: 72515731A0820196CB1FB714CD113FA2B9CAB4C710F258D68F8E5862A9DF368ED59746
                                APIs
                                • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,0038DC50,?,0000000F,0000000C,00000016,0038DC50,?), ref: 00334645
                                  • Part of subcall function 002F936C: __swprintf.LIBCMT ref: 002F93AB
                                  • Part of subcall function 002F936C: __itow.LIBCMT ref: 002F93DF
                                • CharUpperBuffW.USER32(?,?,00000000,?), ref: 003346C5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: BuffCharUpper$__itow__swprintf
                                • String ID: REMOVE$THIS
                                • API String ID: 3797816924-776492005
                                • Opcode ID: 69958b696f5f738c4532c2de34c4b979707617b1ceed020c6276e2ba245f0c2a
                                • Instruction ID: 044b5b5610c3e7bc217754ba532f7e189aa72d82a4ddbb54bb569eb5f5b0240e
                                • Opcode Fuzzy Hash: 69958b696f5f738c4532c2de34c4b979707617b1ceed020c6276e2ba245f0c2a
                                • Instruction Fuzzy Hash: 60416F34A002199FCF02EF64C885ABDB7B5FF49344F148469E916AB2A2DB34ED55CF50
                                APIs
                                  • Part of subcall function 0033430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0032BC08,?,?,00000034,00000800,?,00000034), ref: 00334335
                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0032C1D3
                                  • Part of subcall function 003342D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0032BC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00334300
                                  • Part of subcall function 0033422F: GetWindowThreadProcessId.USER32(?,?), ref: 0033425A
                                  • Part of subcall function 0033422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0032BBCC,00000034,?,?,00001004,00000000,00000000), ref: 0033426A
                                  • Part of subcall function 0033422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0032BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00334280
                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0032C240
                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0032C28D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                • String ID: @
                                • API String ID: 4150878124-2766056989
                                • Opcode ID: d4cb08d077043d5aa6ea385963d04103e7fbda763439fe04124a531f1a3bca07
                                • Instruction ID: f2782cce424580d63c87355c00a4d4b8fe355144494ddfd5d895dd3057080e68
                                • Opcode Fuzzy Hash: d4cb08d077043d5aa6ea385963d04103e7fbda763439fe04124a531f1a3bca07
                                • Instruction Fuzzy Hash: FF414C7690021CAFDB12EFA4CC81AEEB778AF09710F104495FA55BB181DA716E45CB61
                                APIs
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0038DC00,00000000,?,?,?,?), ref: 0035A6D8
                                • GetWindowLongW.USER32 ref: 0035A6F5
                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0035A705
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$Long
                                • String ID: SysTreeView32
                                • API String ID: 847901565-1698111956
                                • Opcode ID: ab45ec1e32b5c653daae37cce6403c9199d45785a8f77abf6b5c0916bde67965
                                • Instruction ID: 061f81d78e299dd8a292e6f8c11810a34bd0bba80e30f3edaed5ff77c3f69e90
                                • Opcode Fuzzy Hash: ab45ec1e32b5c653daae37cce6403c9199d45785a8f77abf6b5c0916bde67965
                                • Instruction Fuzzy Hash: 1631BE3120160AAFDB228E78CC41FEA77A9FF49324F254725F975931E0C770E854AB90
                                APIs
                                • _memset.LIBCMT ref: 00345190
                                • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 003451C6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CrackInternet_memset
                                • String ID: |$D4
                                • API String ID: 1413715105-3173728052
                                • Opcode ID: ab9c7b870ff206acab1963f2845bcbaee37fcdc74577c47e6efd8b7208476356
                                • Instruction ID: c6bd13b6e513bbb656971f19338e0b2f0a8f3fc9c6da149f6d628ebf3d75b023
                                • Opcode Fuzzy Hash: ab9c7b870ff206acab1963f2845bcbaee37fcdc74577c47e6efd8b7208476356
                                • Instruction Fuzzy Hash: 00313A71C1011DABCF01AFA4CD45AEEBFB9FF18740F100125F915AA166DA716A55CFA0
                                APIs
                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 0035A15E
                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 0035A172
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 0035A196
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$Window
                                • String ID: SysMonthCal32
                                • API String ID: 2326795674-1439706946
                                • Opcode ID: f227bb9b09b9a8d1ba4b0ea4fbce56e5c57d92cf76b1d416b5987af1651faea1
                                • Instruction ID: d57ceacb089e07681f5adf22b98eb7d907a9f5b62a3326ebb7708e05f48e4be2
                                • Opcode Fuzzy Hash: f227bb9b09b9a8d1ba4b0ea4fbce56e5c57d92cf76b1d416b5987af1651faea1
                                • Instruction Fuzzy Hash: B321D132500618ABDF268F94CC82FEA3B79FF48714F110214FE55AB1E0D6B5AC54DBA0
                                APIs
                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 0035A941
                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 0035A94F
                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0035A956
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$DestroyWindow
                                • String ID: msctls_updown32
                                • API String ID: 4014797782-2298589950
                                • Opcode ID: 5d617097c6c6214a911569508b7eea47f2ef91fb95f0fc600e47715805925a65
                                • Instruction ID: 892693be8d4502389d38f42d83f978068b7f3db138fa01b96fc5826e493b5b8f
                                • Opcode Fuzzy Hash: 5d617097c6c6214a911569508b7eea47f2ef91fb95f0fc600e47715805925a65
                                • Instruction Fuzzy Hash: 6221B0B5600609AFDB12DF18CC91DB737ADEF4E3A8F450259FA049B261CB30EC159B61
                                APIs
                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00359A30
                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00359A40
                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00359A65
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$MoveWindow
                                • String ID: Listbox
                                • API String ID: 3315199576-2633736733
                                • Opcode ID: 8aa77349aa5ac9b421e14f070a8dd6663ae0f25d1bb78025e2f2e8ad619acfe2
                                • Instruction ID: 9a380a12bb090f0758ad70175692e8f9d3d2c5684e07b23569471f678c0175ca
                                • Opcode Fuzzy Hash: 8aa77349aa5ac9b421e14f070a8dd6663ae0f25d1bb78025e2f2e8ad619acfe2
                                • Instruction Fuzzy Hash: 4F21AF32610218AFDB268F54CC85FBB3BAEEF89761F028129F9449B1A0C6719C5587A0
                                APIs
                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0035A46D
                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 0035A482
                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 0035A48F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: msctls_trackbar32
                                • API String ID: 3850602802-1010561917
                                • Opcode ID: fdb09cf989d1bbe015d92624fdc30928571bbd15ab73f9bdd7d76d8a5ba6fa76
                                • Instruction ID: 17083c9c413a93783c019de0504cc1abd6e860bf90e6458d1769d10595e83393
                                • Opcode Fuzzy Hash: fdb09cf989d1bbe015d92624fdc30928571bbd15ab73f9bdd7d76d8a5ba6fa76
                                • Instruction Fuzzy Hash: 7211E7B1200208BEEF265FA5CC46FAB37ADEF89754F024218FE45A61A1D7B1E815D720
                                APIs
                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00312350,?), ref: 003122A1
                                • GetProcAddress.KERNEL32(00000000), ref: 003122A8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: RoInitialize$combase.dll
                                • API String ID: 2574300362-340411864
                                • Opcode ID: 36b4339a8a3dee8961c305b87e2593d61b3db6e1f64fd59385aa80727ef671d0
                                • Instruction ID: 16e1735df32d0868b30728231c1559ba54dc8888fb5bfc7479fbbaad12ac248a
                                • Opcode Fuzzy Hash: 36b4339a8a3dee8961c305b87e2593d61b3db6e1f64fd59385aa80727ef671d0
                                • Instruction Fuzzy Hash: 7BE01A74A90300ABDBAB5F74EC4AB5A366CBB0570AF004520F206E50A0CBB94191DF04
                                APIs
                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00312276), ref: 00312376
                                • GetProcAddress.KERNEL32(00000000), ref: 0031237D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: RoUninitialize$combase.dll
                                • API String ID: 2574300362-2819208100
                                • Opcode ID: 2b0a12fa1dcdd9f4ec7ff25b16b569f1e251754eaa62d0c8e96c6b74e6b7a8de
                                • Instruction ID: 6f049a99016c1a06b657ee3fd221e69b1dcf36e612580c9bf3147dafbf809a73
                                • Opcode Fuzzy Hash: 2b0a12fa1dcdd9f4ec7ff25b16b569f1e251754eaa62d0c8e96c6b74e6b7a8de
                                • Instruction Fuzzy Hash: C1E0B678544300ABDB7F9F65ED0DB4A3A7CBB44706F114924F20EE20B0CBB89490DE14
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: LocalTime__swprintf
                                • String ID: %.3d$WIN_XPe
                                • API String ID: 2070861257-2409531811
                                • Opcode ID: b3fce71c89a8d970dde93698675bcc2509139aa6778aa8ba9b7b84af7c1e49e9
                                • Instruction ID: b85850a1cfcb2ead8b5b804ec1995a3ba36e198c78d0c1ca5357002d2b2f5e00
                                • Opcode Fuzzy Hash: b3fce71c89a8d970dde93698675bcc2509139aa6778aa8ba9b7b84af7c1e49e9
                                • Instruction Fuzzy Hash: D7E01271804E18DBCB139790CD45DF9B3BCAB08741F144492F906F1948E7359BC4EE12
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,003521FB,?,003523EF), ref: 00352213
                                • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00352225
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: GetProcessId$kernel32.dll
                                • API String ID: 2574300362-399901964
                                • Opcode ID: 669d5ba75b354334c1d5697b9f737a583a00afcccefba1fb1d7950d2ff4d1ea5
                                • Instruction ID: 492af2d03f58d277dd46ce9a8a6e2882f658732d2080a1dfaaf82113bca91270
                                • Opcode Fuzzy Hash: 669d5ba75b354334c1d5697b9f737a583a00afcccefba1fb1d7950d2ff4d1ea5
                                • Instruction Fuzzy Hash: DDD05E388007169FC7635B24A808A4276E8EF06311F114819EC46A2160D6B0D8C48650
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,00000000,002F42EC,?,002F42AA,?), ref: 002F4304
                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 002F4316
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                • API String ID: 2574300362-1355242751
                                • Opcode ID: 167f56260661df3493ceb24c42ad956f436fafaedb73116a71eff8fec1c3ad94
                                • Instruction ID: aa45368f05f1407c5d6f581d3478b30dfcfe1935f4d4bbde7a03a92d5f6b20df
                                • Opcode Fuzzy Hash: 167f56260661df3493ceb24c42ad956f436fafaedb73116a71eff8fec1c3ad94
                                • Instruction Fuzzy Hash: 69D05E308147139ED7665F64A808653B6E8EF05311F104469E946D2160E7B0C8C08710
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,002F41BB,002F4341,?,002F422F,?,002F41BB,?,?,?,?,002F39FE,?,00000001), ref: 002F4359
                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 002F436B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                • API String ID: 2574300362-3689287502
                                • Opcode ID: a476d95cefc43a7f68daa038bc2366b4982d47c17103fa7c04f4c62f360c5ec0
                                • Instruction ID: ab61278cee8bc4f2ec3319d725ad24a9bb51e2959cec2038c0e6298a9b42e019
                                • Opcode Fuzzy Hash: a476d95cefc43a7f68daa038bc2366b4982d47c17103fa7c04f4c62f360c5ec0
                                • Instruction Fuzzy Hash: 13D05E304147179EC7225F34A808A53B6E8AF21715F114469E896D2150D7B0D8C08710
                                APIs
                                • LoadLibraryA.KERNEL32(oleaut32.dll,?,0033051D,?,003305FE), ref: 00330547
                                • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 00330559
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: RegisterTypeLibForUser$oleaut32.dll
                                • API String ID: 2574300362-1071820185
                                • Opcode ID: eb03c17521f2ee8da47878502e7778550e21cd63186b39e98ce84e6f93651171
                                • Instruction ID: 598b1cfd66d885075c8537067eec5a08d7755c20e74613ead85f32589c446495
                                • Opcode Fuzzy Hash: eb03c17521f2ee8da47878502e7778550e21cd63186b39e98ce84e6f93651171
                                • Instruction Fuzzy Hash: A8D0A7304047129FD7328F25E84864677F8EF02311F51C41DE44BD2150D674C8C0CA10
                                APIs
                                • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,0033052F,?,003306D7), ref: 00330572
                                • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 00330584
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                • API String ID: 2574300362-1587604923
                                • Opcode ID: 9adee3a8b4d050ba3a27345f33b72ee4ac6fdac4d700c29643c280c1312d5c56
                                • Instruction ID: ef9f1b5bb4875fe412a28dac594466fb48d47246cb5d5f4506118e2fe5d0ca20
                                • Opcode Fuzzy Hash: 9adee3a8b4d050ba3a27345f33b72ee4ac6fdac4d700c29643c280c1312d5c56
                                • Instruction Fuzzy Hash: E2D0A7315047129FD7325F34E888B4377F8EF06311F51841DE846D2150D770C4C0CA20
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,0034ECBE,?,0034EBBB), ref: 0034ECD6
                                • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0034ECE8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                • API String ID: 2574300362-1816364905
                                • Opcode ID: c5b735dc0dde4729ca6189f69b4129635e212e753849e987b8ab185c6b43af84
                                • Instruction ID: 47f3bf1169967cdaf342b63d74fb33199d58ed18aa5d21005c922c4e78fafe9f
                                • Opcode Fuzzy Hash: c5b735dc0dde4729ca6189f69b4129635e212e753849e987b8ab185c6b43af84
                                • Instruction Fuzzy Hash: C0D05E304047239ECB225B65A88864276E8AF05310F018419E84A92191DAB0D8C09610
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,00000000,0034BAD3,00000001,0034B6EE,?,0038DC00), ref: 0034BAEB
                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 0034BAFD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: GetModuleHandleExW$kernel32.dll
                                • API String ID: 2574300362-199464113
                                • Opcode ID: cef4363aff21dce3e0ec67593eac781d6fd26bde993aa404e3ba7a3a9e6922dd
                                • Instruction ID: a0f4e55a780d5f95f3af3de8ee7f60395a3e5c7ea0ed9c5503df2afe0720e880
                                • Opcode Fuzzy Hash: cef4363aff21dce3e0ec67593eac781d6fd26bde993aa404e3ba7a3a9e6922dd
                                • Instruction Fuzzy Hash: 61D0A9308047129FCB339F24E848B92B7E8EF01310F01842AE88BE2250EBB0E8C0CB10
                                APIs
                                • LoadLibraryA.KERNEL32(advapi32.dll,?,00353BD1,?,00353E06), ref: 00353BE9
                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00353BFB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: RegDeleteKeyExW$advapi32.dll
                                • API String ID: 2574300362-4033151799
                                • Opcode ID: 401967aa3a97f437e78107c15a82879c70898f3486f44332bd7c3c8fa1ae6c71
                                • Instruction ID: cc39c6d3d490dfc2d4b2d0329ffaa14e4b2d6a1f9c6c6290c3a5104838186b5b
                                • Opcode Fuzzy Hash: 401967aa3a97f437e78107c15a82879c70898f3486f44332bd7c3c8fa1ae6c71
                                • Instruction Fuzzy Hash: 41D05E70500752DAC7225F60A808A86BAB8AF02325F114469E84AA2160D6B0C4848A10
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b6f7a2ed54c16c6f136828d0f2f070beb262c0217d0021b872738570bb3aecc7
                                • Instruction ID: 5cedd2ddd1d88689a31e519b5c9ba1acc310a232ef2f3d21b5304ca06793dea5
                                • Opcode Fuzzy Hash: b6f7a2ed54c16c6f136828d0f2f070beb262c0217d0021b872738570bb3aecc7
                                • Instruction Fuzzy Hash: C3C17D75A0022AEFCB15CF94D884BAEB7B9FF48700F11459AE805AF251D730DE81DBA0
                                APIs
                                • CoInitialize.OLE32(00000000), ref: 0034AAB4
                                • CoUninitialize.OLE32 ref: 0034AABF
                                  • Part of subcall function 00330213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0033027B
                                • VariantInit.OLEAUT32(?), ref: 0034AACA
                                • VariantClear.OLEAUT32(?), ref: 0034AD9D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                • String ID:
                                • API String ID: 780911581-0
                                • Opcode ID: 18418021a21055e03b65c86a5fda9c0e0eb962efcd2196d447c9d8f6ab23af07
                                • Instruction ID: d1d3613a05ec349e5058a3b78316b6b6bd4b1ff6e3398ea412a03b39553750d9
                                • Opcode Fuzzy Hash: 18418021a21055e03b65c86a5fda9c0e0eb962efcd2196d447c9d8f6ab23af07
                                • Instruction Fuzzy Hash: 76A12535644B019FCB12EF14C491B2AB7E9BF89750F044459FA9A9B3A2CB30FD44CB86
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Variant$AllocClearCopyInitString
                                • String ID:
                                • API String ID: 2808897238-0
                                • Opcode ID: d416fb4436b09df7432f93df4ab78d1e7ae7075bb2bd77628957940d26632007
                                • Instruction ID: 634885697af3e36435ba3e4f796092c865542f8adcf159f114c2d812f9dd5162
                                • Opcode Fuzzy Hash: d416fb4436b09df7432f93df4ab78d1e7ae7075bb2bd77628957940d26632007
                                • Instruction Fuzzy Hash: 4C51A434604316DBDB36EF66E495B2EB3E9EF48314F20881FE686CB6D1DB7498808705
                                APIs
                                • GetWindowRect.USER32(00DE68D0,?), ref: 0035C544
                                • ScreenToClient.USER32(?,00000002), ref: 0035C574
                                • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 0035C5DA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$ClientMoveRectScreen
                                • String ID:
                                • API String ID: 3880355969-0
                                • Opcode ID: b6bb8fa94f7b8c8cf4368c337e435277b0d318fa556789766dabd444a1b9a818
                                • Instruction ID: af34f1cce4099c64f3f981388aab10a43862a0ffdfe6804231fb30a988667ec2
                                • Opcode Fuzzy Hash: b6bb8fa94f7b8c8cf4368c337e435277b0d318fa556789766dabd444a1b9a818
                                • Instruction Fuzzy Hash: 68519E74910204AFCF22CF68C880EAE77B5EF45729F259659FD159B2A0D730ED85CB90
                                APIs
                                • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 0032C462
                                • __itow.LIBCMT ref: 0032C49C
                                  • Part of subcall function 0032C6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 0032C753
                                • SendMessageW.USER32(?,0000110A,00000001,?), ref: 0032C505
                                • __itow.LIBCMT ref: 0032C55A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend$__itow
                                • String ID:
                                • API String ID: 3379773720-0
                                • Opcode ID: eb76672649926f74acd454ed40ca642af3faccf7604f33d5430acd53776a8e2c
                                • Instruction ID: 55fe99c0a8f54a54bdd3ec767851c9e5c9dc3adcec3997438e516ff191ff5441
                                • Opcode Fuzzy Hash: eb76672649926f74acd454ed40ca642af3faccf7604f33d5430acd53776a8e2c
                                • Instruction Fuzzy Hash: A141E531A1061CABDF26EF54D851FFFBBB9AF49740F000029FA05A7181DB74AA558F91
                                APIs
                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00333966
                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 00333982
                                • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 003339EF
                                • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 00333A4D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: KeyboardState$InputMessagePostSend
                                • String ID:
                                • API String ID: 432972143-0
                                • Opcode ID: 2c30b58f61661e0504fd9560e6e54524ee7928047b93be1ce0e7466ce46d75cf
                                • Instruction ID: 5f13e0161e010691bb25f707528d932ac7fd1a21beb7a89fd81bb8f6bccfeaf4
                                • Opcode Fuzzy Hash: 2c30b58f61661e0504fd9560e6e54524ee7928047b93be1ce0e7466ce46d75cf
                                • Instruction Fuzzy Hash: 13412970E04208EEEF328B648886BFDBBB99F45311F04815AF4C1961D1C7B48E85D765
                                APIs
                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0033E742
                                • GetLastError.KERNEL32(?,00000000), ref: 0033E768
                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0033E78D
                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0033E7B9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CreateHardLink$DeleteErrorFileLast
                                • String ID:
                                • API String ID: 3321077145-0
                                • Opcode ID: 365e15500e180ba98ed8981249eab8a175faf9c0548cc007667e93ca08913083
                                • Instruction ID: b6f2c3cd091e201270b3f8c94969ee9e81d5ca3a9b52deb97d6e2c6fde107b95
                                • Opcode Fuzzy Hash: 365e15500e180ba98ed8981249eab8a175faf9c0548cc007667e93ca08913083
                                • Instruction Fuzzy Hash: 624125392006149FCB12EF55C485A5DBBE5BF59710F098498EA0AAB3A2CB30FC408F91
                                APIs
                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0035B5D1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: InvalidateRect
                                • String ID:
                                • API String ID: 634782764-0
                                • Opcode ID: 234f77de59fb5d7912af9521a3f4bf11f39cacd75ebd993e02f9446d94065216
                                • Instruction ID: b5b94da80291c820d4f05b8b1452411c01bbd627b57edf86ca4a737336455938
                                • Opcode Fuzzy Hash: 234f77de59fb5d7912af9521a3f4bf11f39cacd75ebd993e02f9446d94065216
                                • Instruction Fuzzy Hash: BC31C274601208BFEF3B9F18CC85FA8F769AB06352FA54901FE51D65F1D730A9888B91
                                APIs
                                • ClientToScreen.USER32(?,?), ref: 0035D807
                                • GetWindowRect.USER32(?,?), ref: 0035D87D
                                • PtInRect.USER32(?,?,0035ED5A), ref: 0035D88D
                                • MessageBeep.USER32(00000000), ref: 0035D8FE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Rect$BeepClientMessageScreenWindow
                                • String ID:
                                • API String ID: 1352109105-0
                                • Opcode ID: 6fb03be95ddbe57749df78ce575ec1b03f2daebfe3a905a07c859556f4a16fdc
                                • Instruction ID: 57df351ef03aabcbaf1c4d23782247f06c4bcd522684db1f3974b6fd473c53df
                                • Opcode Fuzzy Hash: 6fb03be95ddbe57749df78ce575ec1b03f2daebfe3a905a07c859556f4a16fdc
                                • Instruction Fuzzy Hash: 42414774A00219DFCB22DF59D884FA9BBF9BB49316F1981A9ED149F270D730A949CB40
                                APIs
                                • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 00333AB8
                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 00333AD4
                                • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 00333B34
                                • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 00333B92
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: KeyboardState$InputMessagePostSend
                                • String ID:
                                • API String ID: 432972143-0
                                • Opcode ID: a1315a254da09715725bb0509856ba3265f6a1abc120917d14564d714a76cde3
                                • Instruction ID: 184ffcd9f462d3e0f63ff9b582fc4828ac1ea4a33d4433ca4e9df0deecabe5a8
                                • Opcode Fuzzy Hash: a1315a254da09715725bb0509856ba3265f6a1abc120917d14564d714a76cde3
                                • Instruction Fuzzy Hash: 16314630A04258AEEF338B648899BFEFBB99F45321F05815AE485972D1C7748F85C761
                                APIs
                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00324038
                                • __isleadbyte_l.LIBCMT ref: 00324066
                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00324094
                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 003240CA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                • String ID:
                                • API String ID: 3058430110-0
                                • Opcode ID: 4a168b9c059f5cc47b197db41acb8de5ccd348adfb9f4660c1b4306da9beef88
                                • Instruction ID: e5750f50c55c9c7a0535694db23cc75f27c241470de4176b6e0cdf2028d8a57b
                                • Opcode Fuzzy Hash: 4a168b9c059f5cc47b197db41acb8de5ccd348adfb9f4660c1b4306da9beef88
                                • Instruction Fuzzy Hash: 9131B231600226EFDB23DF74D845BAABBB9FF44310F168429EA658B190E731D8D1DB90
                                APIs
                                • GetForegroundWindow.USER32 ref: 00357CB9
                                  • Part of subcall function 00335F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 00335F6F
                                  • Part of subcall function 00335F55: GetCurrentThreadId.KERNEL32 ref: 00335F76
                                  • Part of subcall function 00335F55: AttachThreadInput.USER32(00000000,?,0033781F), ref: 00335F7D
                                • GetCaretPos.USER32(?), ref: 00357CCA
                                • ClientToScreen.USER32(00000000,?), ref: 00357D03
                                • GetForegroundWindow.USER32 ref: 00357D09
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                • String ID:
                                • API String ID: 2759813231-0
                                • Opcode ID: d2db239db637dccddc502ec1e57bc13c233c585459673410443e9f74a8eb2708
                                • Instruction ID: 5f81babc033a9c822609c96603035b41ca561ad3d921abc77ce28904b63e7188
                                • Opcode Fuzzy Hash: d2db239db637dccddc502ec1e57bc13c233c585459673410443e9f74a8eb2708
                                • Instruction Fuzzy Hash: D531FF71900108AFDB11EFA5D8859EFBBFDEF54314F108466E815E7251DA319E45CBA0
                                APIs
                                  • Part of subcall function 0030B34E: GetWindowLongW.USER32(?,000000EB), ref: 0030B35F
                                • GetCursorPos.USER32(?), ref: 0035F211
                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0036E4C0,?,?,?,?,?), ref: 0035F226
                                • GetCursorPos.USER32(?), ref: 0035F270
                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0036E4C0,?,?,?), ref: 0035F2A6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                • String ID:
                                • API String ID: 2864067406-0
                                • Opcode ID: 1c7d102b798d9451276a7ceb735b21acabe298644fe7dfe418eba91403e87593
                                • Instruction ID: 0caa2dfc323d1d0b261038d9ed064d1ae5c7b63c6568d7b2cbcfc82d083e1377
                                • Opcode Fuzzy Hash: 1c7d102b798d9451276a7ceb735b21acabe298644fe7dfe418eba91403e87593
                                • Instruction Fuzzy Hash: F721A07D500018AFCB278F94C858EEABBB9EF4A721F148469FD094B2B1D3309990DB90
                                APIs
                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00344358
                                  • Part of subcall function 003443E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00344401
                                  • Part of subcall function 003443E2: InternetCloseHandle.WININET(00000000), ref: 0034449E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Internet$CloseConnectHandleOpen
                                • String ID:
                                • API String ID: 1463438336-0
                                • Opcode ID: 792102390dc16c9293ae129450f3378ebe0da7d2b667810eed8b1563aacb37bf
                                • Instruction ID: 2297ee69fad20b9be22ab7a77c6306df39163ad146f1d60da2fa33f2967726c4
                                • Opcode Fuzzy Hash: 792102390dc16c9293ae129450f3378ebe0da7d2b667810eed8b1563aacb37bf
                                • Instruction Fuzzy Hash: 6B21A47A200605BBDB179F609C01F7BB7EDFF44B10F14402ABA159A550D771A861AB90
                                APIs
                                • GetWindowLongW.USER32(?,000000EC), ref: 00358AA6
                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00358AC0
                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00358ACE
                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00358ADC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$Long$AttributesLayered
                                • String ID:
                                • API String ID: 2169480361-0
                                • Opcode ID: 1206c5385fee336c2afe977308ac32d0bc86534c3a34400a0994bcebd93b60e1
                                • Instruction ID: fc3461c1b4f1f7f448337c4eeb1cea40729f9c581bbf25d0b785622b671cbf53
                                • Opcode Fuzzy Hash: 1206c5385fee336c2afe977308ac32d0bc86534c3a34400a0994bcebd93b60e1
                                • Instruction Fuzzy Hash: FE11D331255115AFD716AB18CC05FBAB7ADBF85321F18411AFD1ADB2E2CF70AC548B90
                                APIs
                                • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00348AE0
                                • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00348AF2
                                • accept.WSOCK32(00000000,00000000,00000000), ref: 00348AFF
                                • WSAGetLastError.WSOCK32(00000000), ref: 00348B16
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ErrorLastacceptselect
                                • String ID:
                                • API String ID: 385091864-0
                                • Opcode ID: f05c2af29a659c9ce9952d8274b92c0a42210d975e69c8696afdf2f4dd784827
                                • Instruction ID: 672a2b7071d91fc76cb1bc2cadfba1ab5bf7b743ae9723fb89f343d422e6e7f6
                                • Opcode Fuzzy Hash: f05c2af29a659c9ce9952d8274b92c0a42210d975e69c8696afdf2f4dd784827
                                • Instruction Fuzzy Hash: E9216671A001249FC726DF69C895A9EBBFCEF49350F00816AF849EB291DB7499858F90
                                APIs
                                  • Part of subcall function 00331E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00330ABB,?,?,?,0033187A,00000000,000000EF,00000119,?,?), ref: 00331E77
                                  • Part of subcall function 00331E68: lstrcpyW.KERNEL32(00000000,?,?,00330ABB,?,?,?,0033187A,00000000,000000EF,00000119,?,?,00000000), ref: 00331E9D
                                  • Part of subcall function 00331E68: lstrcmpiW.KERNEL32(00000000,?,00330ABB,?,?,?,0033187A,00000000,000000EF,00000119,?,?), ref: 00331ECE
                                • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0033187A,00000000,000000EF,00000119,?,?,00000000), ref: 00330AD4
                                • lstrcpyW.KERNEL32(00000000,?,?,0033187A,00000000,000000EF,00000119,?,?,00000000), ref: 00330AFA
                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,0033187A,00000000,000000EF,00000119,?,?,00000000), ref: 00330B2E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: lstrcmpilstrcpylstrlen
                                • String ID: cdecl
                                • API String ID: 4031866154-3896280584
                                • Opcode ID: 775cc939d2c8d101e2211bcb207d1b1b99d916f4dc27d3398a5c46b19df972f3
                                • Instruction ID: beb319285d720a4c5072d2bc67b348e408cd9af39f316d9404f453c4e5f71e28
                                • Opcode Fuzzy Hash: 775cc939d2c8d101e2211bcb207d1b1b99d916f4dc27d3398a5c46b19df972f3
                                • Instruction Fuzzy Hash: FC119636100305AFDB269F74DC95D7A77B8FF45354F81416AE806CB290EB71D950C7A0
                                APIs
                                • _free.LIBCMT ref: 00322FB5
                                  • Part of subcall function 0031395C: __FF_MSGBANNER.LIBCMT ref: 00313973
                                  • Part of subcall function 0031395C: __NMSG_WRITE.LIBCMT ref: 0031397A
                                  • Part of subcall function 0031395C: RtlAllocateHeap.NTDLL(00DC0000,00000000,00000001,00000001,00000000,?,?,0030F507,?,0000000E), ref: 0031399F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: AllocateHeap_free
                                • String ID:
                                • API String ID: 614378929-0
                                • Opcode ID: 6ae2343754f21910ab09f544b37c1434e0bbaea002b567460390d90af59c5140
                                • Instruction ID: 05c95aa06fcb822d8a8e29c16f6f6e8f005e3231cdbeb589d030219698ca472a
                                • Opcode Fuzzy Hash: 6ae2343754f21910ab09f544b37c1434e0bbaea002b567460390d90af59c5140
                                • Instruction Fuzzy Hash: 3A11A731509221BBDB373B70BC056EA3BB8AF58360F258525F9499E161DB34C9809AE0
                                APIs
                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 003305AC
                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 003305C7
                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 003305DD
                                • FreeLibrary.KERNEL32(?), ref: 00330632
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                • String ID:
                                • API String ID: 3137044355-0
                                • Opcode ID: fc14ea7bca2f7eebcd18576e1267b4e4b3046831a5bbc1e8fec06868bc1370dc
                                • Instruction ID: dc0ef3663c875796d082a813322d0a530f75b105ad6e235ae7cd2f6e7b4db317
                                • Opcode Fuzzy Hash: fc14ea7bca2f7eebcd18576e1267b4e4b3046831a5bbc1e8fec06868bc1370dc
                                • Instruction Fuzzy Hash: E7219371900209EFDB26CF91DCEAADABBBCEF80700F00846DE51A96550D774EA95DF50
                                APIs
                                • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00336733
                                • _memset.LIBCMT ref: 00336754
                                • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 003367A6
                                • CloseHandle.KERNEL32(00000000), ref: 003367AF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CloseControlCreateDeviceFileHandle_memset
                                • String ID:
                                • API String ID: 1157408455-0
                                • Opcode ID: 37a8e17aa0837842e6f83429abbb7895a83a40687015a8bbb9e2ee42a204b1ab
                                • Instruction ID: 2e8eeac2aa11b1a579cbd62dbef4f1fff6492f07fd6dc16824923826a6a103d5
                                • Opcode Fuzzy Hash: 37a8e17aa0837842e6f83429abbb7895a83a40687015a8bbb9e2ee42a204b1ab
                                • Instruction Fuzzy Hash: AF11CA759012287AE73157A5AC8DFEBBABCEF44764F10419AF508E71D0D2744EC08B64
                                APIs
                                  • Part of subcall function 0032AA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0032AA79
                                  • Part of subcall function 0032AA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0032AA83
                                  • Part of subcall function 0032AA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0032AA92
                                  • Part of subcall function 0032AA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0032AA99
                                  • Part of subcall function 0032AA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0032AAAF
                                • GetLengthSid.ADVAPI32(?,00000000,0032ADE4,?,?), ref: 0032B21B
                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0032B227
                                • HeapAlloc.KERNEL32(00000000), ref: 0032B22E
                                • CopySid.ADVAPI32(?,00000000,?), ref: 0032B247
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
                                • String ID:
                                • API String ID: 4217664535-0
                                • Opcode ID: 4e5f2e3a0d20380656df31720f5a18361a09b4a24e748b1b0f16d5cd998bdccd
                                • Instruction ID: 5fe8603cda5b8fa518b2e0e9b8073dc52b935070d0613f99e4afdb016b4e3441
                                • Opcode Fuzzy Hash: 4e5f2e3a0d20380656df31720f5a18361a09b4a24e748b1b0f16d5cd998bdccd
                                • Instruction Fuzzy Hash: 6711CE71A00315EFCB1A9F98ED84AAEB7BDEF84304F14882DE94697210D731AE84CB10
                                APIs
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0032B498
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0032B4AA
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0032B4C0
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0032B4DB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: e28c84abc7309406fa8b20c469dbdec75524dcbc302e69c35840d160a94a5747
                                • Instruction ID: f36348bb98b1340a8499e2af18bd260e654a12d0772a524c47aeb4bad81821ce
                                • Opcode Fuzzy Hash: e28c84abc7309406fa8b20c469dbdec75524dcbc302e69c35840d160a94a5747
                                • Instruction Fuzzy Hash: 6611487A900228FFDB11EFA9C881E9DBBB8FB08710F204091E604B7290D771AE10DB94
                                APIs
                                  • Part of subcall function 0030B34E: GetWindowLongW.USER32(?,000000EB), ref: 0030B35F
                                • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 0030B5A5
                                • GetClientRect.USER32(?,?), ref: 0036E69A
                                • GetCursorPos.USER32(?), ref: 0036E6A4
                                • ScreenToClient.USER32(?,?), ref: 0036E6AF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Client$CursorLongProcRectScreenWindow
                                • String ID:
                                • API String ID: 4127811313-0
                                • Opcode ID: bf9a45c6b333b608d40d97c67e1d4e1ed30ce58afbffc2b85f3a6a4d8a4894d5
                                • Instruction ID: 400499d0a7f30b0aa554319bc0b28317cacfa2d9b443ed3cce8f2cee552b5b30
                                • Opcode Fuzzy Hash: bf9a45c6b333b608d40d97c67e1d4e1ed30ce58afbffc2b85f3a6a4d8a4894d5
                                • Instruction Fuzzy Hash: 9911483590102ABFCB12DF94CC959EEBBBCEF0A305F500491F902E7180D334AA85CBA1
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 00337352
                                • MessageBoxW.USER32(?,?,?,?), ref: 00337385
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0033739B
                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 003373A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                • String ID:
                                • API String ID: 2880819207-0
                                • Opcode ID: 951c9d9c1c759f5335e34c5196cbebee00fe07a281e8b37c082b14b517ca2e86
                                • Instruction ID: c8ca4505a7f5e4ed32e84104d07be6ce948725df6ec5948c5414ca2e4f136f20
                                • Opcode Fuzzy Hash: 951c9d9c1c759f5335e34c5196cbebee00fe07a281e8b37c082b14b517ca2e86
                                • Instruction Fuzzy Hash: 3D1104B6A04214BFD7139BA8DC49ADE7BADAF48324F044315F925E32A1D7708D009BA0
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0030D1BA
                                • GetStockObject.GDI32(00000011), ref: 0030D1CE
                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 0030D1D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CreateMessageObjectSendStockWindow
                                • String ID:
                                • API String ID: 3970641297-0
                                • Opcode ID: 6e24a2c751adc7fe00eecbddf09ead6c4d06d5096b3b7aa5e09c4a2e6431e4b4
                                • Instruction ID: cc082bbd9ca5854636e73db8103c15abc4d2b73415c18b223bd8caa77b02de65
                                • Opcode Fuzzy Hash: 6e24a2c751adc7fe00eecbddf09ead6c4d06d5096b3b7aa5e09c4a2e6431e4b4
                                • Instruction Fuzzy Hash: 9F11AD72102549BFEB5B4F90DC60EEABBADFF08364F054105FA1556090CB31DCA0EBA0
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                • String ID:
                                • API String ID: 3016257755-0
                                • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                • Instruction ID: 8bdbe58a5d8b73550558282048052b205083da57c85c6b0f6737028e90e0be4e
                                • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                • Instruction Fuzzy Hash: 3901493604015EBBDF135F84EC018EE3F27BB18350B5A8455FE2899035D336CAB2AB81
                                APIs
                                  • Part of subcall function 00317A0D: __getptd_noexit.LIBCMT ref: 00317A0E
                                • __lock.LIBCMT ref: 0031748F
                                • InterlockedDecrement.KERNEL32(?), ref: 003174AC
                                • _free.LIBCMT ref: 003174BF
                                • InterlockedIncrement.KERNEL32(00DD1590), ref: 003174D7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                • String ID:
                                • API String ID: 2704283638-0
                                • Opcode ID: 8f7bf2f9f245e49290b33609e366512163d82cb74be294b0e3a2904f13275342
                                • Instruction ID: 1881ba7204efb362269e278bc985c8f55d11ef1312371ba3ae7efbba04e29ed0
                                • Opcode Fuzzy Hash: 8f7bf2f9f245e49290b33609e366512163d82cb74be294b0e3a2904f13275342
                                • Instruction Fuzzy Hash: 5D018436909A11A7DB2BAFA698067DDBB74BF0D710F1E4005F4146B690CF2459C1CFD2
                                APIs
                                  • Part of subcall function 0030AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0030AFE3
                                  • Part of subcall function 0030AF83: SelectObject.GDI32(?,00000000), ref: 0030AFF2
                                  • Part of subcall function 0030AF83: BeginPath.GDI32(?), ref: 0030B009
                                  • Part of subcall function 0030AF83: SelectObject.GDI32(?,00000000), ref: 0030B033
                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0035EA8E
                                • LineTo.GDI32(00000000,?,?), ref: 0035EA9B
                                • EndPath.GDI32(00000000), ref: 0035EAAB
                                • StrokePath.GDI32(00000000), ref: 0035EAB9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                • String ID:
                                • API String ID: 1539411459-0
                                • Opcode ID: 6cc325987a14d3f3d87e361cfd5f5c2b6787b0c727cda4fd867a0d471439a865
                                • Instruction ID: 57ececd27580e588bf1a05b64f98931dd722583cd66cc7ad9ad6d64dd01b73fb
                                • Opcode Fuzzy Hash: 6cc325987a14d3f3d87e361cfd5f5c2b6787b0c727cda4fd867a0d471439a865
                                • Instruction Fuzzy Hash: DBF05E32005259BBDB23AFA4AC09FCA3F2DAF06311F044201FE15650E1877456A5CB95
                                APIs
                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0032C84A
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0032C85D
                                • GetCurrentThreadId.KERNEL32 ref: 0032C864
                                • AttachThreadInput.USER32(00000000), ref: 0032C86B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                • String ID:
                                • API String ID: 2710830443-0
                                • Opcode ID: 124a5f348f453387264bfd159a0802f34cddbb59fdb89ce02482dae1d9698711
                                • Instruction ID: 3558097fd6a307f501fb6bcb6af345f2433c90077243b4c00cda00417c3e7ca0
                                • Opcode Fuzzy Hash: 124a5f348f453387264bfd159a0802f34cddbb59fdb89ce02482dae1d9698711
                                • Instruction Fuzzy Hash: FDE0ED71541238BADB225BA2EC0DEDB7F6CEF167A1F818025B60D95461C6B1C5C1DBE0
                                APIs
                                • GetCurrentThread.KERNEL32 ref: 0032B0D6
                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,0032AC9D), ref: 0032B0DD
                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0032AC9D), ref: 0032B0EA
                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,0032AC9D), ref: 0032B0F1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CurrentOpenProcessThreadToken
                                • String ID:
                                • API String ID: 3974789173-0
                                • Opcode ID: a05fdb3dbf60118433c2f52df4d813213a8d83dbd733eb9a7f973d23fb910cde
                                • Instruction ID: 91e1db7128a04089d927f6e0ba99029dd342338b064d563631a1062b999c1d46
                                • Opcode Fuzzy Hash: a05fdb3dbf60118433c2f52df4d813213a8d83dbd733eb9a7f973d23fb910cde
                                • Instruction Fuzzy Hash: 8BE04F326012219BE7321FB16C0CB477BBCAF55791F028818A245DA040DB248481C760
                                APIs
                                • GetSysColor.USER32(00000008), ref: 0030B496
                                • SetTextColor.GDI32(?,000000FF), ref: 0030B4A0
                                • SetBkMode.GDI32(?,00000001), ref: 0030B4B5
                                • GetStockObject.GDI32(00000005), ref: 0030B4BD
                                • GetWindowDC.USER32(?,00000000), ref: 0036DE2B
                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0036DE38
                                • GetPixel.GDI32(00000000,?,00000000), ref: 0036DE51
                                • GetPixel.GDI32(00000000,00000000,?), ref: 0036DE6A
                                • GetPixel.GDI32(00000000,?,?), ref: 0036DE8A
                                • ReleaseDC.USER32(?,00000000), ref: 0036DE95
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                • String ID:
                                • API String ID: 1946975507-0
                                • Opcode ID: 18c3c13c3d92f8020fdc581ac6b6883dec33831b89f6f48c1c5d50485c17c8b3
                                • Instruction ID: 40b64453f848239e7f0f07d9793dc9efcf0061fbec5913cc6bd2597c66b60597
                                • Opcode Fuzzy Hash: 18c3c13c3d92f8020fdc581ac6b6883dec33831b89f6f48c1c5d50485c17c8b3
                                • Instruction Fuzzy Hash: A2E0ED31600244ABDB736B74AC09BD87B25AF52335F14C666FA79580E5C7B24981DB11
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CapsDesktopDeviceReleaseWindow
                                • String ID:
                                • API String ID: 2889604237-0
                                • Opcode ID: 233385cd9d8c1e2d194baf2c9966bda36c79abf17213632c022d73287be2d3f0
                                • Instruction ID: fc7876bb4d8cdc730aaadab3a678dcbfee0bd3ef10583d0bb9a24fbaef54d098
                                • Opcode Fuzzy Hash: 233385cd9d8c1e2d194baf2c9966bda36c79abf17213632c022d73287be2d3f0
                                • Instruction Fuzzy Hash: 39E012B1100204EFEB125FB09848A2EBBBCEF4C350F21C80AF85E9B250CB7998808B40
                                APIs
                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0032B2DF
                                • UnloadUserProfile.USERENV(?,?), ref: 0032B2EB
                                • CloseHandle.KERNEL32(?), ref: 0032B2F4
                                • CloseHandle.KERNEL32(?), ref: 0032B2FC
                                  • Part of subcall function 0032AB24: GetProcessHeap.KERNEL32(00000000,?,0032A848), ref: 0032AB2B
                                  • Part of subcall function 0032AB24: HeapFree.KERNEL32(00000000), ref: 0032AB32
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                • String ID:
                                • API String ID: 146765662-0
                                • Opcode ID: 40b275791906236ea757cb88b3d0a3269882e3301c963b67e07740f1064f62fe
                                • Instruction ID: 605a9303dd71b5d9ec3c4d623e2ffa35425de359474b9ff4a972ab6ae65c793a
                                • Opcode Fuzzy Hash: 40b275791906236ea757cb88b3d0a3269882e3301c963b67e07740f1064f62fe
                                • Instruction Fuzzy Hash: 15E0263A104405BBDB126FA5EC08859FBBAFF993217108621F62981575CB32A8B1EB91
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: CapsDesktopDeviceReleaseWindow
                                • String ID:
                                • API String ID: 2889604237-0
                                • Opcode ID: cc95ad5e3dd2cd51b7cef4e00f9f3a11f817ef7d271ae7548d6928a95af50c15
                                • Instruction ID: 4af9a30eb94e28689963b4137fffcfe4baf3fd776cf3d259d1192d92959251fc
                                • Opcode Fuzzy Hash: cc95ad5e3dd2cd51b7cef4e00f9f3a11f817ef7d271ae7548d6928a95af50c15
                                • Instruction Fuzzy Hash: DEE046B1500204EFDB129F70DC4CA2DBBBCEF4C350F118809F95E9B260CB79A8808B40
                                APIs
                                • OleSetContainedObject.OLE32(?,00000001), ref: 0032DEAA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ContainedObject
                                • String ID: AutoIt3GUI$Container
                                • API String ID: 3565006973-3941886329
                                • Opcode ID: bf10c97f87c4a7566f68c663aa083c58a922f8fe15b6131cd2a90892847511b9
                                • Instruction ID: 7d48e9b23b7b4e54b440b6608f526d7f7a7e922d0bf9dabd4f35d26609d95a66
                                • Opcode Fuzzy Hash: bf10c97f87c4a7566f68c663aa083c58a922f8fe15b6131cd2a90892847511b9
                                • Instruction Fuzzy Hash: 94914674600611AFDB26CF68D884B6AB7B9FF49710F10846DF94ACF691DB70E841CB60
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _wcscpy
                                • String ID: I/6$I/6
                                • API String ID: 3048848545-433665731
                                • Opcode ID: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                • Instruction ID: beefeeb3d2a2e5d90206a3a137bdecbe67b609ca3b907045c1d2d772a0f73b74
                                • Opcode Fuzzy Hash: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                • Instruction Fuzzy Hash: 2441F73590021AABCF26EF98D4C1AFEB7B4EF18711F51505AF981AB191DB305E92C7A0
                                APIs
                                • Sleep.KERNEL32(00000000), ref: 0030BCDA
                                • GlobalMemoryStatusEx.KERNEL32 ref: 0030BCF3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: GlobalMemorySleepStatus
                                • String ID: @
                                • API String ID: 2783356886-2766056989
                                • Opcode ID: be8002a0d7096649a6e3dd1b44c6dc5d15b71ab1a5456b7992368560c6be6884
                                • Instruction ID: 75eee5150419293c450169e00af7b6148e00fae0bd3602aff954fcba3ed656c2
                                • Opcode Fuzzy Hash: be8002a0d7096649a6e3dd1b44c6dc5d15b71ab1a5456b7992368560c6be6884
                                • Instruction Fuzzy Hash: A55133714097449BE321AF14DC8ABAFBBECFF95354F41484EF1C8450A6EB7085AC8752
                                APIs
                                  • Part of subcall function 002F44ED: __fread_nolock.LIBCMT ref: 002F450B
                                • _wcscmp.LIBCMT ref: 0033C65D
                                • _wcscmp.LIBCMT ref: 0033C670
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: _wcscmp$__fread_nolock
                                • String ID: FILE
                                • API String ID: 4029003684-3121273764
                                • Opcode ID: c3e4ef6bd966809d32d96151f5735ea6f4149cf152372bfe8767176e35b97de9
                                • Instruction ID: d069396a3fb2f93fd8372685b7de9d65c83697acd9c0cfc00b0dc945dcd1b016
                                • Opcode Fuzzy Hash: c3e4ef6bd966809d32d96151f5735ea6f4149cf152372bfe8767176e35b97de9
                                • Instruction Fuzzy Hash: 6E41D872A1020A7ADF21ABA4DC82FEFB7B9EF49714F001479F605FB181D6B19A148B51
                                APIs
                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 0035A85A
                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0035A86F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: '
                                • API String ID: 3850602802-1997036262
                                • Opcode ID: 49f86183b0f177717d7f52b9d2637428e17b52c10ed237ecc7b9ab82919873be
                                • Instruction ID: 4bb2493333709b698bcd3c50be3fc6fd5e3f36c79e93ebb87741a4132a659d24
                                • Opcode Fuzzy Hash: 49f86183b0f177717d7f52b9d2637428e17b52c10ed237ecc7b9ab82919873be
                                • Instruction Fuzzy Hash: 6441F774A006099FDB15CFA8C880FDABBB9FB08305F15016AEE05AB351D770A945DF91
                                APIs
                                • DestroyWindow.USER32(?,?,?,?), ref: 0035980E
                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0035984A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$DestroyMove
                                • String ID: static
                                • API String ID: 2139405536-2160076837
                                • Opcode ID: a14ce8eda1ae7f2a4b962056623981aa29a80082f2d12e47ed0ca94d23816f3d
                                • Instruction ID: 13e96c3e4d275a4a6af2e2a117b858a1c97c2c08d8f3c820a4259aa291d5f1f0
                                • Opcode Fuzzy Hash: a14ce8eda1ae7f2a4b962056623981aa29a80082f2d12e47ed0ca94d23816f3d
                                • Instruction Fuzzy Hash: 0A316B71110604AAEB129F68CC80FBB73BDFF59765F01861AF9A9C71A0CA31AC85D760
                                APIs
                                • _memset.LIBCMT ref: 003351C6
                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00335201
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: InfoItemMenu_memset
                                • String ID: 0
                                • API String ID: 2223754486-4108050209
                                • Opcode ID: 611b73d66682e10b93e6b348cd9d366fd620d069b688f38621f9ff0d96651ecb
                                • Instruction ID: c46c1cfe8521eac58a84e1c31a4f805176e0b483d8b6de2944d7bbbe8fb3ad15
                                • Opcode Fuzzy Hash: 611b73d66682e10b93e6b348cd9d366fd620d069b688f38621f9ff0d96651ecb
                                • Instruction Fuzzy Hash: 2431B431A007049FEB26CF99D8C5BAFBBF8FF45350F154819E985E61A0D7709A44CB50
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __snwprintf
                                • String ID: , $$AUTOITCALLVARIABLE%d
                                • API String ID: 2391506597-2584243854
                                • Opcode ID: 62eb6bb2f5e95a8902feb19612e61cd6c67ecd52b7eeffd1d669ff8e7c74ecb6
                                • Instruction ID: df3eaaf68cab8e51ca453bfc1b22e9e5675a8dfee8d12ed6dfcc48b06ade379c
                                • Opcode Fuzzy Hash: 62eb6bb2f5e95a8902feb19612e61cd6c67ecd52b7eeffd1d669ff8e7c74ecb6
                                • Instruction Fuzzy Hash: 55219331610118AFCF16EF64D882EEEB7B5EF46340F010469F505AF181DB74EA55CBA6
                                APIs
                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0035945C
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00359467
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: Combobox
                                • API String ID: 3850602802-2096851135
                                • Opcode ID: 261f4bdbcd4c06ea0d7b2204054d9cb47d945a8c632a6b74dc6dd26ecc41effe
                                • Instruction ID: 32822db3afa91905942556ef504d7bd013b625fdb859db2cf7a62f167d43716e
                                • Opcode Fuzzy Hash: 261f4bdbcd4c06ea0d7b2204054d9cb47d945a8c632a6b74dc6dd26ecc41effe
                                • Instruction Fuzzy Hash: B21190B1200208AFEF26DF55DC80FBB376EEB883A5F110126FD189B2A0D6719C568760
                                APIs
                                  • Part of subcall function 0030B34E: GetWindowLongW.USER32(?,000000EB), ref: 0030B35F
                                • GetActiveWindow.USER32 ref: 0035DA7B
                                • EnumChildWindows.USER32(?,0035D75F,00000000), ref: 0035DAF5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$ActiveChildEnumLongWindows
                                • String ID: T14
                                • API String ID: 3814560230-1931324537
                                • Opcode ID: f4ac135cb5208312aef38d22cbc5166948a06ef5a2c559535eae2210731d7c75
                                • Instruction ID: bcd3166cda7061b61e104f968f28fc9c062fa41f3cf627b850a494b96e0f5f4b
                                • Opcode Fuzzy Hash: f4ac135cb5208312aef38d22cbc5166948a06ef5a2c559535eae2210731d7c75
                                • Instruction Fuzzy Hash: 3B211B79604205DFC726DF28D860AA6B7F9EF59321F650619ED6A873E0D730A844CBA0
                                APIs
                                  • Part of subcall function 0030D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0030D1BA
                                  • Part of subcall function 0030D17C: GetStockObject.GDI32(00000011), ref: 0030D1CE
                                  • Part of subcall function 0030D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0030D1D8
                                • GetWindowRect.USER32(00000000,?), ref: 00359968
                                • GetSysColor.USER32(00000012), ref: 00359982
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                • String ID: static
                                • API String ID: 1983116058-2160076837
                                • Opcode ID: f730b9b3a38524ce50d06203a2109549cdd41e0e33c5f2a1cd5e76004b4f6741
                                • Instruction ID: 49f3f233027d82a53d04f7a02ae5e3078e42d1fff25b5ee6155df2fe5d533d27
                                • Opcode Fuzzy Hash: f730b9b3a38524ce50d06203a2109549cdd41e0e33c5f2a1cd5e76004b4f6741
                                • Instruction Fuzzy Hash: 55114472520209AFDB16DFB8C845EEA7BB8EF08314F010629FD55E2250E734E854DB60
                                APIs
                                • GetWindowTextLengthW.USER32(00000000), ref: 00359699
                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 003596A8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: LengthMessageSendTextWindow
                                • String ID: edit
                                • API String ID: 2978978980-2167791130
                                • Opcode ID: 0e96c7a7c4d56bc62901743c7dc5103f6c262309cb1f1eb4153e092411c2a484
                                • Instruction ID: d03a863164d4173fa5c1220957c52fcf7b60e5dc316347e98fdadcd48975eab8
                                • Opcode Fuzzy Hash: 0e96c7a7c4d56bc62901743c7dc5103f6c262309cb1f1eb4153e092411c2a484
                                • Instruction Fuzzy Hash: 80115871500208EAEB225EA8DC80FEB3B6EEB09379F514715FD65971E0C7359C589BA0
                                APIs
                                • _memset.LIBCMT ref: 003352D5
                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 003352F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: InfoItemMenu_memset
                                • String ID: 0
                                • API String ID: 2223754486-4108050209
                                • Opcode ID: 528c7dfe1d7b2f769220de9e4d53967da2629fbbd19447096899b89cfeab5657
                                • Instruction ID: 615d12a08cc7aaccc190c3e203a42a9a570b46b2dabfc37d93d82602c95b91ed
                                • Opcode Fuzzy Hash: 528c7dfe1d7b2f769220de9e4d53967da2629fbbd19447096899b89cfeab5657
                                • Instruction Fuzzy Hash: 7F11047A901614ABDB23DF98DD84F9E77BCAB05764F160125E982E7290D3B0ED04CBD0
                                APIs
                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00344DF5
                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00344E1E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Internet$OpenOption
                                • String ID: <local>
                                • API String ID: 942729171-4266983199
                                • Opcode ID: c583b14b19da61c9cada3ac9cfcc440306fcc51ecda76a3746866607f97abed2
                                • Instruction ID: e87369d026cab5492f46aeb0dd8b7afe76e4d50bbb603817884b8ce5d81c28a7
                                • Opcode Fuzzy Hash: c583b14b19da61c9cada3ac9cfcc440306fcc51ecda76a3746866607f97abed2
                                • Instruction Fuzzy Hash: 7F115A70901261FADB2A8F618899FEBFAECFF16755F10822AF5159A540D2706980C6E0
                                APIs
                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 003237A7
                                • ___raise_securityfailure.LIBCMT ref: 0032388E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: FeaturePresentProcessor___raise_securityfailure
                                • String ID: (;
                                • API String ID: 3761405300-3451541795
                                • Opcode ID: d08f4f6518ad77e5832df449b02b1bf68c9fa48d21198329313ea94644d88869
                                • Instruction ID: c84d04b03ce295e0cc3bd9d2679ffe7ac6897f9fcb2c16e16a5dc535e6678329
                                • Opcode Fuzzy Hash: d08f4f6518ad77e5832df449b02b1bf68c9fa48d21198329313ea94644d88869
                                • Instruction Fuzzy Hash: F82139B5500B04CAD74BDF25F9966427BF8BB48318F105A2AE6048B3A0E3F4EA80CF45
                                APIs
                                • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0034A84E
                                • htons.WSOCK32(00000000,?,00000000), ref: 0034A88B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: htonsinet_addr
                                • String ID: 255.255.255.255
                                • API String ID: 3832099526-2422070025
                                • Opcode ID: f91c646f1fc408c9ae86c5342d3876f085df4bdfeadd78494a342d57e309c372
                                • Instruction ID: 547e1906a3f6064ee399e1981c8de771c0b80ccdc953d4437ae983a11fa37e3d
                                • Opcode Fuzzy Hash: f91c646f1fc408c9ae86c5342d3876f085df4bdfeadd78494a342d57e309c372
                                • Instruction Fuzzy Hash: 8001F579240304ABCB229F68C886FADB7A8EF45714F108526F516AF3D1D771F801CB52
                                APIs
                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 0032B7EF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: ComboBox$ListBox
                                • API String ID: 3850602802-1403004172
                                • Opcode ID: 4af4f11c7f03cadbea6dbfa3ae3e1ae5e7927271c059712322d91ee5c37b1f7f
                                • Instruction ID: 88156dd7f8326fecc29d2d40c640c2ae9273a282dc9bf092ef63f2ca54ed3644
                                • Opcode Fuzzy Hash: 4af4f11c7f03cadbea6dbfa3ae3e1ae5e7927271c059712322d91ee5c37b1f7f
                                • Instruction Fuzzy Hash: CD014C7161012CABCB06EBA8DC42DFEB37DBF06354B14061CF561672C2DF7058188B90
                                APIs
                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 0032B6EB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: ComboBox$ListBox
                                • API String ID: 3850602802-1403004172
                                • Opcode ID: d3fbb0ee1268cb1d534818b4e02d7159733ab141c948c89c0f97d411785f9ec8
                                • Instruction ID: a23edf3aadc2e5c25b4029d4c70b695785ef482b4aa0f83871e2627a28dcdacf
                                • Opcode Fuzzy Hash: d3fbb0ee1268cb1d534818b4e02d7159733ab141c948c89c0f97d411785f9ec8
                                • Instruction Fuzzy Hash: 0101677564111C6BDB06EBA4DA52EFFB3AC9F06344F200029B502B7291DF545E189BB5
                                APIs
                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 0032B76C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: ComboBox$ListBox
                                • API String ID: 3850602802-1403004172
                                • Opcode ID: 647c51fb9994c4b7121bb862d5483bcb26d86750a89dc2453da37648ce9e1364
                                • Instruction ID: e5190489f3e44a66bff857c1ad71e0fa6b595cda6f0d17f72c73c12c3125a365
                                • Opcode Fuzzy Hash: 647c51fb9994c4b7121bb862d5483bcb26d86750a89dc2453da37648ce9e1364
                                • Instruction Fuzzy Hash: 4F01D67564011CABDB06E7A8DA02EFFB3AC9F06344F600029B501B3292DB645E199BB5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: __calloc_crt
                                • String ID: ";
                                • API String ID: 3494438863-4069014424
                                • Opcode ID: 764d4f85f7b0eaec9212ea68e515fd968af7ab0c072221bf6cd8606a258aab87
                                • Instruction ID: a3a35dbe41af0805763e849c23dc62a5af01490c23b2e3c31b4daa2809f3544a
                                • Opcode Fuzzy Hash: 764d4f85f7b0eaec9212ea68e515fd968af7ab0c072221bf6cd8606a258aab87
                                • Instruction Fuzzy Hash: 7EF062712096119AEB6FDB59FC416E767DCE709768F114B1AF304CE296E730C8C18B94
                                APIs
                                • LoadImageW.USER32(002F0000,00000063,00000001,00000010,00000010,00000000), ref: 002F4048
                                • EnumResourceNamesW.KERNEL32(00000000,0000000E,003367E9,00000063,00000000,75A50280,?,?,002F3EE1,?,?,000000FF), ref: 003641B3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: EnumImageLoadNamesResource
                                • String ID: >/
                                • API String ID: 1578290342-237351608
                                • Opcode ID: fa3197b74e95b68c6cc98e88fcbf30d01ddd3ae39a27beded76090815d2fa475
                                • Instruction ID: c25fc5f609f1f4104c8fbb04668c4403e6195e927585a53354759e11728be317
                                • Opcode Fuzzy Hash: fa3197b74e95b68c6cc98e88fcbf30d01ddd3ae39a27beded76090815d2fa475
                                • Instruction Fuzzy Hash: F6F09031650314BBE2316B1ABC5AFD33BADE705BB9F50061AF314AA1E0D3F090C08A90
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: ClassName_wcscmp
                                • String ID: #32770
                                • API String ID: 2292705959-463685578
                                • Opcode ID: 4e5916beb58f96d6dec89f248dc96a903195bdfbd389a0f2b552cdaec6784708
                                • Instruction ID: 4eb6539f69aff8249aa1c1a0a27f30cf3f16a7abe32f4485c4c7bc162a03f703
                                • Opcode Fuzzy Hash: 4e5916beb58f96d6dec89f248dc96a903195bdfbd389a0f2b552cdaec6784708
                                • Instruction Fuzzy Hash: F6E0D87760433427D721EAA5DC4AFD7FBACEB55764F01011AFA09D3041D670E64187D4
                                APIs
                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 0032A63F
                                  • Part of subcall function 003113F1: _doexit.LIBCMT ref: 003113FB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: Message_doexit
                                • String ID: AutoIt$Error allocating memory.
                                • API String ID: 1993061046-4017498283
                                • Opcode ID: 06d04bfeaf1b94b659f8967f4ceeaf387e6f91afa8bdf6fca5afad6d0f4e0c82
                                • Instruction ID: ff0411bfa63b2e729da8c992de6db4d5367e1848f59922cb43043d9c15bfaa6d
                                • Opcode Fuzzy Hash: 06d04bfeaf1b94b659f8967f4ceeaf387e6f91afa8bdf6fca5afad6d0f4e0c82
                                • Instruction Fuzzy Hash: 77D05B313C572837D227369C7C17FD5764C9F16F91F040465FB0C995C24AD6969042DA
                                APIs
                                • GetSystemDirectoryW.KERNEL32(?), ref: 0036ACC0
                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0036AEBD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: DirectoryFreeLibrarySystem
                                • String ID: WIN_XPe
                                • API String ID: 510247158-3257408948
                                • Opcode ID: 0bc438f47eab51c19d99dd332527955ad19d7a402af7ba7be24aaaf2e61a4e56
                                • Instruction ID: d441c08d066f1316c49201ed4834bb9ec22c46b40e4564099774c621ed215a06
                                • Opcode Fuzzy Hash: 0bc438f47eab51c19d99dd332527955ad19d7a402af7ba7be24aaaf2e61a4e56
                                • Instruction Fuzzy Hash: 18E0C9B0C04A499FCB13DBA9D9449ECB7BCAB49701F14C185E116B6964DB705A84DF22
                                APIs
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003586A2
                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 003586B5
                                  • Part of subcall function 00337A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00337AD0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: FindMessagePostSleepWindow
                                • String ID: Shell_TrayWnd
                                • API String ID: 529655941-2988720461
                                • Opcode ID: cb471c342b7626872bc984d37f10304a015323172b9a49493c32c73eb1cb6e84
                                • Instruction ID: 62f8fa37989983ae74eb8c6b8ab8114199859e4b6488b4b822c724adf40f67c7
                                • Opcode Fuzzy Hash: cb471c342b7626872bc984d37f10304a015323172b9a49493c32c73eb1cb6e84
                                • Instruction Fuzzy Hash: 50D01271785318B7E27667709C4BFC67A6C9F06B31F100819F74DAA1D0C9E0E980C754
                                APIs
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003586E2
                                • PostMessageW.USER32(00000000), ref: 003586E9
                                  • Part of subcall function 00337A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00337AD0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1285042686.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                • Associated: 00000000.00000002.1285016529.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000037D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285118469.000000000039E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285191153.00000000003AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1285231967.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2f0000_MX-6240N_20241120_124324.jbxd
                                Similarity
                                • API ID: FindMessagePostSleepWindow
                                • String ID: Shell_TrayWnd
                                • API String ID: 529655941-2988720461
                                • Opcode ID: 9ab80f1a867a83343e14689e33f4832f2545562e66f3e73b7de9392633609c52
                                • Instruction ID: 7be86a3c5b18857ea65bf1a60b1b5d7757894d875863c4f315dc24f167b87f09
                                • Opcode Fuzzy Hash: 9ab80f1a867a83343e14689e33f4832f2545562e66f3e73b7de9392633609c52
                                • Instruction Fuzzy Hash: 9AD0C9717853186BE27667709C4BFC66A689B06B21F500819B649AA1D0C9A0A9808658