Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SOA SEP 2024.exe

Overview

General Information

Sample name:SOA SEP 2024.exe
Analysis ID:1560694
MD5:3463c053c39de2170aa78b8aa253e999
SHA1:e40e4169c635a3a34acb63928ad2ce89089a52fe
SHA256:4b53b5e5756b9b3f43e32650b65590d0fe529e653a469b361df4bcf710b4e943
Tags:exeRedLineStealeruser-lowmal3
Infos:

Detection

PureLog Stealer, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected Snake Keylogger
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SOA SEP 2024.exe (PID: 6348 cmdline: "C:\Users\user\Desktop\SOA SEP 2024.exe" MD5: 3463C053C39DE2170AA78B8AA253E999)
    • RegSvcs.exe (PID: 1560 cmdline: "C:\Users\user\Desktop\SOA SEP 2024.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI/sendMessage?chat_id=1443320838", "Token": "7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI", "Chat_id": "1443320838", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2102007208.00000000006C0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 A9 88 44 24 2B 88 44 24 2F B0 E5 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000002.00000002.4553786112.0000000003359000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          Click to see the 30 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 A9 88 44 24 2B 88 44 24 2F B0 E5 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          0.2.SOA SEP 2024.exe.6c0000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 A9 88 44 24 2B 88 44 24 2F B0 E5 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          2.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 A9 88 44 24 2B 88 44 24 2F B0 E5 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          2.2.RegSvcs.exe.5750000.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            2.2.RegSvcs.exe.5750000.7.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              Click to see the 118 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-22T07:47:13.206173+010028033053Unknown Traffic192.168.2.549706104.21.67.152443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-22T07:47:07.003618+010028032742Potentially Bad Traffic192.168.2.549704193.122.130.080TCP
              2024-11-22T07:47:08.412852+010028032742Potentially Bad Traffic192.168.2.549704193.122.130.080TCP
              2024-11-22T07:47:11.537970+010028032742Potentially Bad Traffic192.168.2.549704193.122.130.080TCP
              2024-11-22T07:47:15.522259+010028032742Potentially Bad Traffic192.168.2.549707193.122.130.080TCP
              2024-11-22T07:47:19.115995+010028032742Potentially Bad Traffic192.168.2.549709193.122.130.080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI/sendMessage?chat_id=1443320838", "Token": "7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI", "Chat_id": "1443320838", "Version": "5.1"}
              Source: SOA SEP 2024.exeReversingLabs: Detection: 31%
              Source: SOA SEP 2024.exeVirustotal: Detection: 27%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: SOA SEP 2024.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: SOA SEP 2024.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.5:49705 version: TLS 1.0
              Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: SOA SEP 2024.exe, 00000000.00000003.2096647600.0000000003690000.00000004.00001000.00020000.00000000.sdmp, SOA SEP 2024.exe, 00000000.00000003.2096906807.00000000034F0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: SOA SEP 2024.exe, 00000000.00000003.2096647600.0000000003690000.00000004.00001000.00020000.00000000.sdmp, SOA SEP 2024.exe, 00000000.00000003.2096906807.00000000034F0000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A6CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_007A6CA9
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_007A60DD
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_007A63F9
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007AEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007AEB60
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007AF56F FindFirstFileW,FindClose,0_2_007AF56F
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007AF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_007AF5FA
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007B1B2F
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007B1C8A
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007B1F94
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h2_2_02DCE128
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAB781h2_2_06BAB4D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BA045Dh2_2_06BA0040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BACD39h2_2_06BACA90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAD191h2_2_06BACEE8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAC8E1h2_2_06BAC638
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAF8A9h2_2_06BAF600
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BADA41h2_2_06BAD798
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BA045Dh2_2_06BA038B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BADE99h2_2_06BADBF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAAA79h2_2_06BAA7D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAA1C9h2_2_06BA9F20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAA621h2_2_06BAA378
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAD5E9h2_2_06BAD340
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAE749h2_2_06BAE4A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAB329h2_2_06BAB080
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAEBA1h2_2_06BAE8F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAAED1h2_2_06BAAC28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BA045Dh2_2_06BA0006
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAE2F1h2_2_06BAE048
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAF451h2_2_06BAF1A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAC031h2_2_06BABD88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAC489h2_2_06BAC1E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BABBD9h2_2_06BAB930
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BAEFF9h2_2_06BAED50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC58C1h2_2_06BC5618
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC77E5h2_2_06BC74A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC619Ah2_2_06BC5EF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC6A49h2_2_06BC67A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC4761h2_2_06BC44B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_06BC256E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC5011h2_2_06BC4D68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC8322h2_2_06BC8278
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC5D19h2_2_06BC5A70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC8322h2_2_06BC8270
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_06BC2258
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_06BC2247
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC6EA1h2_2_06BC6BF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC65F1h2_2_06BC6348
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC42E1h2_2_06BC4038
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC72F9h2_2_06BC7050
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC5469h2_2_06BC51C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06BC4BB9h2_2_06BC4910

              Networking

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
              Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49707 -> 193.122.130.0:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 193.122.130.0:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49709 -> 193.122.130.0:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49706 -> 104.21.67.152:443
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.5:49705 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B4EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007B4EB5
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: RegSvcs.exe, 00000002.00000002.4553786112.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003359000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RegSvcs.exe, 00000002.00000002.4553786112.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003359000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.00000000032F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003294000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegSvcs.exe, 00000002.00000002.4553786112.00000000031D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: RegSvcs.exe, 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegSvcs.exe, 00000002.00000002.4553786112.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.00000000032CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000002.00000002.4553786112.00000000031D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegSvcs.exe, 00000002.00000002.4553786112.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.00000000032F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000002.00000002.4553786112.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegSvcs.exe, 00000002.00000002.4553786112.00000000032F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.75
              Source: RegSvcs.exe, 00000002.00000002.4553786112.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.00000000032F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.75$
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B6B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007B6B0C
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B6D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_007B6D07
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B6B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007B6B0C
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A2B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_007A2B37
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007CF7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_007CF7FF

              System Summary

              barindex
              Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 0.2.SOA SEP 2024.exe.6c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.2102007208.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000002.00000002.4552483120.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: RegSvcs.exe PID: 1560, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RegSvcs.exe PID: 1560, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: This is a third-party compiled AutoIt script.0_2_00763D19
              Source: SOA SEP 2024.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: SOA SEP 2024.exe, 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ae532dc0-1
              Source: SOA SEP 2024.exe, 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: ySDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_9f3682b0-c
              Source: SOA SEP 2024.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2804b69f-a
              Source: SOA SEP 2024.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_199655e8-2
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A6606: CreateFileW,DeviceIoControl,CloseHandle,0_2_007A6606
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0079ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_0079ACC5
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A79D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007A79D3
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0078B0430_2_0078B043
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0079410F0_2_0079410F
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007802A40_2_007802A4
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0076E3E30_2_0076E3E3
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0079038E0_2_0079038E
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0079467F0_2_0079467F
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007806D90_2_007806D9
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007CAACE0_2_007CAACE
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00794BEF0_2_00794BEF
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0078CCC10_2_0078CCC1
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0076AF500_2_0076AF50
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00766F070_2_00766F07
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0077B11F0_2_0077B11F
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007C31BC0_2_007C31BC
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0078D1B90_2_0078D1B9
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0079724D0_2_0079724D
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0078123A0_2_0078123A
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007732000_2_00773200
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007693F00_2_007693F0
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A13CA0_2_007A13CA
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0077F5630_2_0077F563
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007AB6CC0_2_007AB6CC
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007696C00_2_007696C0
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007CF7FF0_2_007CF7FF
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007677B00_2_007677B0
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007979C90_2_007979C9
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0077FA570_2_0077FA57
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00773B700_2_00773B70
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00769B600_2_00769B60
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00767D190_2_00767D19
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0077FE6F0_2_0077FE6F
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00789ED00_2_00789ED0
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00767FA30_2_00767FA3
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00D695C00_2_00D695C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00408C602_2_00408C60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040DC112_2_0040DC11
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00407C3F2_2_00407C3F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00418CCC2_2_00418CCC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00406CA02_2_00406CA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004028B02_2_004028B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041A4BE2_2_0041A4BE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004182442_2_00418244
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004016502_2_00401650
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F202_2_00402F20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004193C42_2_004193C4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004187882_2_00418788
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F892_2_00402F89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402B902_2_00402B90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004073A02_2_004073A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02DC12C02_2_02DC12C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02DC12B02_2_02DC12B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02DC15502_2_02DC1550
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02DC15602_2_02DC1560
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BA22A82_2_06BA22A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BA6E982_2_06BA6E98
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BA67C82_2_06BA67C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAB4D82_2_06BAB4D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BA229A2_2_06BA229A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BACA902_2_06BACA90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BACA822_2_06BACA82
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BACEE82_2_06BACEE8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BACEDC2_2_06BACEDC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAC6382_2_06BAC638
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAC62A2_2_06BAC62A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BA5E202_2_06BA5E20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BA5E102_2_06BA5E10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAF6002_2_06BAF600
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAD7982_2_06BAD798
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAD7922_2_06BAD792
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BADBF02_2_06BADBF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BADBE42_2_06BADBE4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAA7D02_2_06BAA7D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAA7C02_2_06BAA7C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAD3302_2_06BAD330
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BA9F202_2_06BA9F20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BA9F0F2_2_06BA9F0F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAA3782_2_06BAA378
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAA36A2_2_06BAA36A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAD3402_2_06BAD340
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAE4A02_2_06BAE4A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAE4902_2_06BAE490
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAB0802_2_06BAB080
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAE8F82_2_06BAE8F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAE8E82_2_06BAE8E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAB4C82_2_06BAB4C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAE0392_2_06BAE039
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAAC282_2_06BAAC28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAAC192_2_06BAAC19
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAB0702_2_06BAB070
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAE0482_2_06BAE048
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BA65A82_2_06BA65A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAF1A82_2_06BAF1A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAF1982_2_06BAF198
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BABD882_2_06BABD88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAF5F02_2_06BAF5F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAC1E02_2_06BAC1E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAC1D02_2_06BAC1D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAB9302_2_06BAB930
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAB9202_2_06BAB920
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BABD782_2_06BABD78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAED502_2_06BAED50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BAED402_2_06BAED40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCA6B02_2_06BCA6B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCC6B02_2_06BCC6B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC56182_2_06BC5618
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC74A82_2_06BC74A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCAD182_2_06BCAD18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC93882_2_06BC9388
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCB3802_2_06BCB380
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC7B002_2_06BC7B00
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCA0502_2_06BCA050
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCC0502_2_06BCC050
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC00402_2_06BC0040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC99F02_2_06BC99F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCB9E82_2_06BCB9E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC16B82_2_06BC16B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC16A72_2_06BC16A7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCA6A02_2_06BCA6A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC5EF02_2_06BC5EF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC5EE12_2_06BC5EE1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC56082_2_06BC5608
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC67A02_2_06BC67A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC67902_2_06BC6790
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC44B82_2_06BC44B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC44A82_2_06BC44A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC74992_2_06BC7499
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC25D02_2_06BC25D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCAD0A2_2_06BCAD0A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC4D682_2_06BC4D68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC4D582_2_06BC4D58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC7AF02_2_06BC7AF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC32D02_2_06BC32D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC5A702_2_06BC5A70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC5A602_2_06BC5A60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC22582_2_06BC2258
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC22472_2_06BC2247
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC6BF82_2_06BC6BF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC6BE92_2_06BC6BE9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC63392_2_06BC6339
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC93782_2_06BC9378
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCB3702_2_06BCB370
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC63482_2_06BC6348
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC40382_2_06BC4038
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC40282_2_06BC4028
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC70502_2_06BC7050
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC70402_2_06BC7040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCA0402_2_06BCA040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCC0402_2_06BCC040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC51B12_2_06BC51B1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC99E22_2_06BC99E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCB9D72_2_06BCB9D7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC51C02_2_06BC51C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC49102_2_06BC4910
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BC49002_2_06BC4900
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: String function: 0077EC2F appears 68 times
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: String function: 0078F8A0 appears 35 times
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: String function: 00786AC0 appears 42 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
              Source: SOA SEP 2024.exe, 00000000.00000003.2096072898.0000000003613000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SOA SEP 2024.exe
              Source: SOA SEP 2024.exe, 00000000.00000003.2097026105.00000000037BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SOA SEP 2024.exe
              Source: SOA SEP 2024.exe, 00000000.00000002.2102007208.00000000006C0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs SOA SEP 2024.exe
              Source: SOA SEP 2024.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 0.2.SOA SEP 2024.exe.6c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.2102007208.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000002.00000002.4552483120.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: RegSvcs.exe PID: 1560, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RegSvcs.exe PID: 1560, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, 2-.csCryptographic APIs: 'TransformFinalBlock'
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, 2-.csCryptographic APIs: 'TransformFinalBlock'
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, ---.csBase64 encoded string: 'tPa5k5FJD4dSXw0EqQ2lIcLtrXnSHhm60gt1D+3WpsNqPxTv3g1y5+EIwUawZGy8'
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, ---.csBase64 encoded string: 'tPa5k5FJD4dSXw0EqQ2lIcLtrXnSHhm60gt1D+3WpsNqPxTv3g1y5+EIwUawZGy8'
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, ---.csBase64 encoded string: 'tPa5k5FJD4dSXw0EqQ2lIcLtrXnSHhm60gt1D+3WpsNqPxTv3g1y5+EIwUawZGy8'
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, ---.csBase64 encoded string: 'tPa5k5FJD4dSXw0EqQ2lIcLtrXnSHhm60gt1D+3WpsNqPxTv3g1y5+EIwUawZGy8'
              Source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, ---.csBase64 encoded string: 'tPa5k5FJD4dSXw0EqQ2lIcLtrXnSHhm60gt1D+3WpsNqPxTv3g1y5+EIwUawZGy8'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007ACE7A GetLastError,FormatMessageW,0_2_007ACE7A
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0079AB84 AdjustTokenPrivileges,CloseHandle,0_2_0079AB84
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0079B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_0079B134
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007AE1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_007AE1FD
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A6532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_007A6532
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007BC18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_007BC18C
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0076406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_0076406B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeFile created: C:\Users\user\AppData\Local\Temp\aut6260.tmpJump to behavior
              Source: SOA SEP 2024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RegSvcs.exe, 00000002.00000002.4553786112.00000000033DA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003410000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555060395.0000000004266000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.000000000341D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.00000000033E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: SOA SEP 2024.exeReversingLabs: Detection: 31%
              Source: SOA SEP 2024.exeVirustotal: Detection: 27%
              Source: unknownProcess created: C:\Users\user\Desktop\SOA SEP 2024.exe "C:\Users\user\Desktop\SOA SEP 2024.exe"
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SOA SEP 2024.exe"
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SOA SEP 2024.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: SOA SEP 2024.exeStatic file information: File size 1146368 > 1048576
              Source: SOA SEP 2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: SOA SEP 2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: SOA SEP 2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: SOA SEP 2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: SOA SEP 2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: SOA SEP 2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: SOA SEP 2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: SOA SEP 2024.exe, 00000000.00000003.2096647600.0000000003690000.00000004.00001000.00020000.00000000.sdmp, SOA SEP 2024.exe, 00000000.00000003.2096906807.00000000034F0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: SOA SEP 2024.exe, 00000000.00000003.2096647600.0000000003690000.00000004.00001000.00020000.00000000.sdmp, SOA SEP 2024.exe, 00000000.00000003.2096906807.00000000034F0000.00000004.00001000.00020000.00000000.sdmp
              Source: SOA SEP 2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: SOA SEP 2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: SOA SEP 2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: SOA SEP 2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: SOA SEP 2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0077E01E LoadLibraryA,GetProcAddress,0_2_0077E01E
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0077288B push 66007723h; retn 007Dh0_2_007728E1
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00786B05 push ecx; ret 0_2_00786B18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C40C push cs; iretd 2_2_0041C4E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00423149 push eax; ret 2_2_00423179
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C50E push cs; iretd 2_2_0041C4E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004231C8 push eax; ret 2_2_00423179
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E21D push ecx; ret 2_2_0040E230
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C6BE push ebx; ret 2_2_0041C6BF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041BFCD pushad ; ret 2_2_0041BFCE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02DC4771 pushfd ; iretd 2_2_02DC4772
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02DC2720 push FFFFFF9Eh; iretd 2_2_02DC2724
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BCE48F push es; retf 2_2_06BCE490
              Source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'lXmeqrAKqylJZ', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'lXmeqrAKqylJZ', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'lXmeqrAKqylJZ', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'lXmeqrAKqylJZ', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'lXmeqrAKqylJZ', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007C8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_007C8111
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0077EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0077EB42
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0078123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0078123A
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1560, type: MEMORYSTR
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeAPI/Special instruction interceptor: Address: D691E4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599782Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599657Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599532Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599422Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598938Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598813Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598594Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598469Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595113Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1515Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8302Jump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeEvaded block: after key decisiongraph_0-94424
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeEvaded block: after key decisiongraph_0-95455
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-94984
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeAPI coverage: 4.4 %
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A6CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_007A6CA9
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_007A60DD
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_007A63F9
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007AEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007AEB60
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007AF56F FindFirstFileW,FindClose,0_2_007AF56F
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007AF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_007AF5FA
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007B1B2F
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007B1C8A
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007B1F94
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0077DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0077DDC0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599782Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599657Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599532Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599422Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598938Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598813Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598594Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598469Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595113Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
              Source: RegSvcs.exe, 00000002.00000002.4553026302.0000000001436000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B6AAF BlockInput,0_2_007B6AAF
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00763D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00763D19
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00793920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00793920
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0077E01E LoadLibraryA,GetProcAddress,0_2_0077E01E
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00D694B0 mov eax, dword ptr fs:[00000030h]0_2_00D694B0
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00D69450 mov eax, dword ptr fs:[00000030h]0_2_00D69450
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00D67E30 mov eax, dword ptr fs:[00000030h]0_2_00D67E30
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0079A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0079A66C
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007881AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007881AC
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00788189 SetUnhandledExceptionFilter,0_2_00788189
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040CE09
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040E61C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00416F6A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004123F1 SetUnhandledExceptionFilter,2_2_004123F1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F3E008Jump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0079B106 LogonUserW,0_2_0079B106
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00763D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00763D19
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A411C SendInput,keybd_event,0_2_007A411C
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A74E7 mouse_event,0_2_007A74E7
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SOA SEP 2024.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0079A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0079A66C
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007A71FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_007A71FA
              Source: SOA SEP 2024.exeBinary or memory string: Shell_TrayWnd
              Source: SOA SEP 2024.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007865C4 cpuid 0_2_007865C4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,2_2_00417A20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_007B091D
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007DB340 GetUserNameW,0_2_007DB340
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_00791E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00791E8E
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_0077DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0077DDC0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4553786112.0000000003359000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4553786112.00000000031D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1560, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: SOA SEP 2024.exeBinary or memory string: WIN_81
              Source: SOA SEP 2024.exeBinary or memory string: WIN_XP
              Source: SOA SEP 2024.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
              Source: SOA SEP 2024.exeBinary or memory string: WIN_XPe
              Source: SOA SEP 2024.exeBinary or memory string: WIN_VISTA
              Source: SOA SEP 2024.exeBinary or memory string: WIN_7
              Source: SOA SEP 2024.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1560, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4175570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee4ee6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4176458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee4ee6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5650000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.41a9590.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5650000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750ee8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4176458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4175570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee5dce.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5750ee8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.41a9590.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2ee5dce.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4553786112.0000000003359000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4553786112.00000000031D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1560, type: MEMORYSTR
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B8C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_007B8C4F
              Source: C:\Users\user\Desktop\SOA SEP 2024.exeCode function: 0_2_007B923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_007B923B
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              3
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              31
              Obfuscated Files or Information
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              Software Packing
              NTDS137
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              1
              DLL Side-Loading
              LSA Secrets141
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Valid Accounts
              Cached Domain Credentials11
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
              Virtualization/Sandbox Evasion
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              SOA SEP 2024.exe32%ReversingLabsWin32.Trojan.AutoitInject
              SOA SEP 2024.exe28%VirustotalBrowse
              SOA SEP 2024.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              104.21.67.152
              truefalse
                high
                checkip.dyndns.com
                193.122.130.0
                truefalse
                  high
                  checkip.dyndns.org
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                      high
                      https://reallyfreegeoip.org/xml/8.46.123.75false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.4553786112.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.00000000032F4000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.4553786112.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003359000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.00000000032F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003294000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.4553786112.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.0000000003359000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.4553786112.00000000031D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.org/xml/8.46.123.75$RegSvcs.exe, 00000002.00000002.4553786112.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.00000000032F4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://checkip.dyndns.org/qRegSvcs.exe, 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmpfalse
                                    high
                                    http://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.4553786112.0000000003340000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553786112.00000000032CE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://reallyfreegeoip.org/xml/RegSvcs.exe, 00000002.00000002.4553786112.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        104.21.67.152
                                        reallyfreegeoip.orgUnited States
                                        13335CLOUDFLARENETUSfalse
                                        193.122.130.0
                                        checkip.dyndns.comUnited States
                                        31898ORACLE-BMC-31898USfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1560694
                                        Start date and time:2024-11-22 07:46:05 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 8m 48s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:5
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:SOA SEP 2024.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@3/2@2/2
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 96%
                                        • Number of executed functions: 51
                                        • Number of non-executed functions: 298
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        01:47:10API Interceptor10536255x Sleep call for process: RegSvcs.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        104.21.67.152STAFF RECORD_pdf.arj.exeGet hashmaliciousUnknownBrowse
                                          REQUEST SCHL-30112023-M1 Quotation_1033855_pdf.exeGet hashmaliciousGuLoaderBrowse
                                            Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              ALI HASSO - P02515 & P02518.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                g1TLK7mbZD.imgGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  Justificante de pago.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                    dg_official01.exeGet hashmaliciousGuLoaderBrowse
                                                      FedEx Shipping Confirmation.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                        New Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          HSBC Advice_ACH Credit.com.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                            193.122.130.0QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                            • checkip.dyndns.org/
                                                            Documents.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                            • checkip.dyndns.org/
                                                            #U5ba2#U6237#U9000#U6b3e#U7533#U8bf7#U8868-SUPERLEON NOVIEMBR.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            e-dekont_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            P.O 423737.exeGet hashmaliciousMassLogger RATBrowse
                                                            • checkip.dyndns.org/
                                                            New Order Data sheet Page.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • checkip.dyndns.org/
                                                            Aral#U0131k PO# IRON-TE-160924 _323282-_563028621286 pdf .exeGet hashmaliciousVIP KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            Order88983273293729387293828PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            checkip.dyndns.comorder requirements CIF-TRC809945210.exeGet hashmaliciousGuLoaderBrowse
                                                            • 132.226.8.169
                                                            Updated Invoice_0755404645-2024_pdf.exeGet hashmaliciousUnknownBrowse
                                                            • 158.101.44.242
                                                            QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 193.122.130.0
                                                            CONTRACT COPY PRN00720387_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                            • 132.226.247.73
                                                            Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 193.122.6.168
                                                            PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                            • 193.122.130.0
                                                            New_Order_PO-NG57283H9.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 193.122.6.168
                                                            Order requirements CIF Greece_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            z1MB267382625AE.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            ORDER 20240986 OA.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 158.101.44.242
                                                            reallyfreegeoip.orgorder requirements CIF-TRC809945210.exeGet hashmaliciousGuLoaderBrowse
                                                            • 188.114.97.3
                                                            Updated Invoice_0755404645-2024_pdf.exeGet hashmaliciousUnknownBrowse
                                                            • 188.114.97.3
                                                            QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.97.3
                                                            CONTRACT COPY PRN00720387_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                            • 188.114.97.3
                                                            Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.97.3
                                                            PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                            • 188.114.97.3
                                                            New_Order_PO-NG57283H9.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 188.114.96.3
                                                            Order requirements CIF Greece_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            z1MB267382625AE.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.97.3
                                                            ORDER 20240986 OA.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            CLOUDFLARENETUSfile.exeGet hashmaliciousLummaCBrowse
                                                            • 172.67.155.248
                                                            file.exeGet hashmaliciousLummaCBrowse
                                                            • 104.21.66.38
                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                            • 104.21.66.38
                                                            file.exeGet hashmaliciousLummaCBrowse
                                                            • 172.67.155.248
                                                            file.exeGet hashmaliciousLummaCBrowse
                                                            • 172.67.206.172
                                                            https://365214tesauppeortbasd132.z26.web.core.windows.net/#Get hashmaliciousTechSupportScamBrowse
                                                            • 104.22.44.142
                                                            http://103.212.224.14:9998/helloGet hashmaliciousUnknownBrowse
                                                            • 1.1.1.1
                                                            file.exeGet hashmaliciousLummaCBrowse
                                                            • 172.67.155.248
                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                            • 172.67.155.248
                                                            file.exeGet hashmaliciousLummaCBrowse
                                                            • 104.21.66.38
                                                            ORACLE-BMC-31898USarm5.nn-20241122-0008.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 147.154.211.97
                                                            Updated Invoice_0755404645-2024_pdf.exeGet hashmaliciousUnknownBrowse
                                                            • 158.101.44.242
                                                            QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 193.122.130.0
                                                            Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 193.122.6.168
                                                            PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                            • 193.122.130.0
                                                            New_Order_PO-NG57283H9.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 193.122.6.168
                                                            ORDER 20240986 OA.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 158.101.44.242
                                                            http://interpro.wisc.edu/courses/maintaining-asphalt-pavements/?utm_source=Brochure&utm_medium=postal&utm_campaign=D487&utm_term=SHB&utm_content=SepGet hashmaliciousUnknownBrowse
                                                            • 147.154.51.84
                                                            Documents.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 193.122.130.0
                                                            GST DRC-01A - DIN-20230359XL050081843E_msg.exeGet hashmaliciousGuLoaderBrowse
                                                            • 193.122.6.168
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            54328bd36c14bd82ddaa0c04b25ed9adorder requirements CIF-TRC809945210.exeGet hashmaliciousGuLoaderBrowse
                                                            • 104.21.67.152
                                                            Updated Invoice_0755404645-2024_pdf.exeGet hashmaliciousUnknownBrowse
                                                            • 104.21.67.152
                                                            QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            CONTRACT COPY PRN00720387_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                            • 104.21.67.152
                                                            Request for Quotation MK FMHS.RFQ.24.11.21.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 104.21.67.152
                                                            PO-841122676_g787.exeGet hashmaliciousGuLoaderBrowse
                                                            • 104.21.67.152
                                                            New_Order_PO-NG57283H9.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 104.21.67.152
                                                            Order requirements CIF Greece_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            z1MB267382625AE.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            ORDER 20240986 OA.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 104.21.67.152
                                                            No context
                                                            Process:C:\Users\user\Desktop\SOA SEP 2024.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):222146
                                                            Entropy (8bit):7.981355724617144
                                                            Encrypted:false
                                                            SSDEEP:3072:4oa8/LxK2X8f14yw+1peECs96IRSb54qES7T4YrsTTkw3LRVGRKcUVHip12HQnkF:IQK2XXRCW3Iyb4YqIRKcUVy0+7UOVj+h
                                                            MD5:1E0046A9266966C707E7DA60DCE75D61
                                                            SHA1:7B27D43535BE7C5D4A84C6D903BD03ECC48E6EC3
                                                            SHA-256:BEA5536D8CB0C3F76A77186E1824EBDEC60335A88FA0E638F8F359768DF410EF
                                                            SHA-512:2E3844CB9E00B7135CC04EAED2EBA2A60C904C18CB0327437D545818598D69AD0D0758D68562F78A99830828C16D22478664C7BBAE6384F36579391C4503FB78
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:EA06......xT..:.D.R&T._>oR.M@.Je"e..L&.*P.ni...N..4.K..V.....)7...._..b..W:...:..IZ.Y$.E.u:.W...../d......uX..'fOD.F.....5.M....:.q...3]t...J.tm..3?..........*.M$..o..=.^.&.i.L- ...M7.F.z.X.....e ..j.N.B)....0..a.O..g.:....).jp...........6.'!.J%p.8.L&.p.L.......).j}S...R...'..H.S......i..r..W....5....*mSyh...}./..X.l...Y.>(.5.$.o...}...y8..).p..J.4u)3*}@....U[..A-.T..L%h.h.Qh..0....'|. ....O.....4Y(..D..4....~.P..j.N.......S..Ju"e/..&.*@...u.Q .._h.o......&...*e...$.N>}0.l........L...,.............?y.7.....?.:.G.I.[.[.%..H.R:....k....|...X.....F{7..w.D...X._...M.S9...D........].}i.+..2..f...+....(...:....q.....1...3.F.ku..J.|&>...kiS^t.......}....u.Y.V..L.' .'c..l)wj....Q(.|x.Q....<.-..0..PMn2.j.S..]...$.Tx..w..R]5...w.A.Y9.:>...bT)S..Z....y.`QC.L.C..jG7a.._.8.FJ.....T....v..&.._?..t{....u..ry...6...T....E..+.N.J.S..Jg/.N..6..t..1.l..k~.g..[.2._.}....3P.Rk...)....!...x.}..w..[....!N....Z..#..K.e.........T..u|.}SaN.@v.Z&.g.....'.Yn.Q..Z5..v.e!.
                                                            Process:C:\Users\user\Desktop\SOA SEP 2024.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):229376
                                                            Entropy (8bit):7.836520561819933
                                                            Encrypted:false
                                                            SSDEEP:6144:Q3LKimksOj8gTsl2nWsmTSbhOktNCAs0J0ZmMUFQ:8zmLHqESbh9tYP6Q
                                                            MD5:821F850470B5EC37BE0461D86BFCE11E
                                                            SHA1:EE9EA33CE5EF21BA2FBCDC025A0DB20C7BCF7460
                                                            SHA-256:9EC184ECAE01EB3E76DED1EA71FF03FD0959EDC4B75FCFEC2089292A4193244E
                                                            SHA-512:541E9C512E9B2DBC9ED347DD84452388D462A74FCF95CCB96EA9F6AC10FE0BEE7A92FF238CA9E847FD53D6DDCF4A13202552F5BB1901E71F11A2A3D06D618379
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:}m.J6NDDHH2O..7R.5NDDLH2.T07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDD.H2OZ/.\J.G.e.I~.ud_;9.>6++:S"tSV<$Z:d&)h@::.^<jq..d!'V*z=:Xn5NDDLH2'D..~;.0h5.6.>.N.q5Kq5.2C..*.F.4.?.:.9.1f.Y,VD.:vo!L.%.I`iN0i5.6`&7X.#.KNDDLH2OT07RJ5NDD.e.)T07R.pND.ML2;.0gRJ5NDDLH.Ow1<SC5N.ELH.NT07RJ..DDLX2OT.6RJ5.DD\H2OV07WJ5NDDLH7OT07RJ5N.GLH6OT..PJ7ND.LH"OT 7RJ5^DD\H2OT07BJ5NDDLH2OT0.GH5.DDLHRMT.hSJ5NDDLH2OT07RJ5NDDLH2OT07..4NXDLH2OT07RJ5NDDLH2OT07RJ5NDD.E0O.07RJ5NDDLH2O.17.K5NDDLH2OT07RJ5NDDLH2OT07RJ.:!<8H2OL.6RJ%NDD.I2OP07RJ5NDDLH2OT0.RJU`6 -<SOT.ZRJ5.EDL&2OT.6RJ5NDDLH2OT07.J5.j -<SOT0.bJ5NdFLH$OT0=PJ5NDDLH2OT07R.5N.j>;@,T07..4ND$NH2/U07rH5NDDLH2OT07RJuND.LH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2OT07RJ5NDDLH2O
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):7.071268501351523
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:SOA SEP 2024.exe
                                                            File size:1'146'368 bytes
                                                            MD5:3463c053c39de2170aa78b8aa253e999
                                                            SHA1:e40e4169c635a3a34acb63928ad2ce89089a52fe
                                                            SHA256:4b53b5e5756b9b3f43e32650b65590d0fe529e653a469b361df4bcf710b4e943
                                                            SHA512:6a6a5376213f65070e5160ba34f7a7e3f44dc6c8e0e9f8205c3d5ba7dd402c0a372d42dd3a2899f7fce4eef3e5d879d64f41246d7a5139785278935e7315d82c
                                                            SSDEEP:24576:htb20pkaCqT5TBWgNQ7aMqEpVK5aXVF6tw6A:yVg5tQ7aM+5KIW5
                                                            TLSH:8535CF1373DE8361C3B26273BA65B701BE7B782506A1F56B2FD8093DB920162521E773
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                                            Icon Hash:aaf3e3e3938382a0
                                                            Entrypoint:0x425f74
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x673FF18F [Fri Nov 22 02:50:55 2024 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:5
                                                            OS Version Minor:1
                                                            File Version Major:5
                                                            File Version Minor:1
                                                            Subsystem Version Major:5
                                                            Subsystem Version Minor:1
                                                            Import Hash:3d95adbf13bbe79dc24dccb401c12091
                                                            Instruction
                                                            call 00007F1A4906A1DFh
                                                            jmp 00007F1A4905D1F4h
                                                            int3
                                                            int3
                                                            push edi
                                                            push esi
                                                            mov esi, dword ptr [esp+10h]
                                                            mov ecx, dword ptr [esp+14h]
                                                            mov edi, dword ptr [esp+0Ch]
                                                            mov eax, ecx
                                                            mov edx, ecx
                                                            add eax, esi
                                                            cmp edi, esi
                                                            jbe 00007F1A4905D37Ah
                                                            cmp edi, eax
                                                            jc 00007F1A4905D6DEh
                                                            bt dword ptr [004C0158h], 01h
                                                            jnc 00007F1A4905D379h
                                                            rep movsb
                                                            jmp 00007F1A4905D68Ch
                                                            cmp ecx, 00000080h
                                                            jc 00007F1A4905D544h
                                                            mov eax, edi
                                                            xor eax, esi
                                                            test eax, 0000000Fh
                                                            jne 00007F1A4905D380h
                                                            bt dword ptr [004BA370h], 01h
                                                            jc 00007F1A4905D850h
                                                            bt dword ptr [004C0158h], 00000000h
                                                            jnc 00007F1A4905D51Dh
                                                            test edi, 00000003h
                                                            jne 00007F1A4905D52Eh
                                                            test esi, 00000003h
                                                            jne 00007F1A4905D50Dh
                                                            bt edi, 02h
                                                            jnc 00007F1A4905D37Fh
                                                            mov eax, dword ptr [esi]
                                                            sub ecx, 04h
                                                            lea esi, dword ptr [esi+04h]
                                                            mov dword ptr [edi], eax
                                                            lea edi, dword ptr [edi+04h]
                                                            bt edi, 03h
                                                            jnc 00007F1A4905D383h
                                                            movq xmm1, qword ptr [esi]
                                                            sub ecx, 08h
                                                            lea esi, dword ptr [esi+08h]
                                                            movq qword ptr [edi], xmm1
                                                            lea edi, dword ptr [edi+08h]
                                                            test esi, 00000007h
                                                            je 00007F1A4905D3D5h
                                                            bt esi, 03h
                                                            jnc 00007F1A4905D428h
                                                            movdqa xmm1, dqword ptr [esi+00h]
                                                            Programming Language:
                                                            • [ C ] VS2008 SP1 build 30729
                                                            • [IMP] VS2008 SP1 build 30729
                                                            • [ASM] VS2012 UPD4 build 61030
                                                            • [RES] VS2012 UPD4 build 61030
                                                            • [LNK] VS2012 UPD4 build 61030
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x4ede8.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1130000x6c4c.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0xc40000x4ede80x4ee00bfe04f99d10dae32771335e32b71f505False0.9197052050316957data7.8762021667992705IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x1130000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0xc44a00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                            RT_ICON0xc45c80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                            RT_ICON0xc48b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                            RT_ICON0xc49d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                            RT_ICON0xc58800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                            RT_ICON0xc61280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                            RT_ICON0xc66900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                            RT_ICON0xc8c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                            RT_ICON0xc9ce00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                            RT_STRING0xca1480x594dataEnglishGreat Britain0.3333333333333333
                                                            RT_STRING0xca6dc0x68adataEnglishGreat Britain0.2747909199522103
                                                            RT_STRING0xcad680x490dataEnglishGreat Britain0.3715753424657534
                                                            RT_STRING0xcb1f80x5fcdataEnglishGreat Britain0.3087467362924282
                                                            RT_STRING0xcb7f40x65cdataEnglishGreat Britain0.34336609336609336
                                                            RT_STRING0xcbe500x466dataEnglishGreat Britain0.3605683836589698
                                                            RT_STRING0xcc2b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                            RT_RCDATA0xcc4100x464bfdata1.0003334085817979
                                                            RT_GROUP_ICON0x1128d00x76dataEnglishGreat Britain0.6610169491525424
                                                            RT_GROUP_ICON0x1129480x14dataEnglishGreat Britain1.15
                                                            RT_VERSION0x11295c0xdcdataEnglishGreat Britain0.6181818181818182
                                                            RT_MANIFEST0x112a380x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                                                            DLLImport
                                                            WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                                                            VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                            COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                                                            MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                            WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                                                            PSAPI.DLLGetProcessMemoryInfo
                                                            IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                            USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                                                            UxTheme.dllIsThemeActive
                                                            KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                                                            USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                                                            GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                                                            COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                            ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                                                            SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                            OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishGreat Britain
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-11-22T07:47:07.003618+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704193.122.130.080TCP
                                                            2024-11-22T07:47:08.412852+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704193.122.130.080TCP
                                                            2024-11-22T07:47:11.537970+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704193.122.130.080TCP
                                                            2024-11-22T07:47:13.206173+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549706104.21.67.152443TCP
                                                            2024-11-22T07:47:15.522259+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549707193.122.130.080TCP
                                                            2024-11-22T07:47:19.115995+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549709193.122.130.080TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 22, 2024 07:47:03.358283997 CET4970480192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:03.477823019 CET8049704193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:03.477978945 CET4970480192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:03.478424072 CET4970480192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:03.597839117 CET8049704193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:05.629949093 CET8049704193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:05.667089939 CET4970480192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:05.786705971 CET8049704193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:06.986040115 CET8049704193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:07.003618002 CET4970480192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:07.123079062 CET8049704193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:08.372770071 CET8049704193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:08.412852049 CET4970480192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:08.895407915 CET49705443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:08.895452023 CET44349705104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:08.895539045 CET49705443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:08.925770998 CET49705443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:08.925791979 CET44349705104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:10.450632095 CET44349705104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:10.450762987 CET49705443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:10.473683119 CET49705443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:10.473711014 CET44349705104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:10.473969936 CET44349705104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:10.522243023 CET49705443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:10.645076990 CET49705443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:10.691339970 CET44349705104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:10.982584000 CET44349705104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:10.982645988 CET44349705104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:10.982800961 CET49705443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:11.016041040 CET49705443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:11.025480032 CET4970480192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:11.145421982 CET8049704193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:11.490664959 CET8049704193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:11.492795944 CET49706443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:11.492846012 CET44349706104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:11.492923975 CET49706443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:11.493273973 CET49706443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:11.493287086 CET44349706104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:11.537970066 CET4970480192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:12.751029968 CET44349706104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:12.757783890 CET49706443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:12.757812023 CET44349706104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:13.206156969 CET44349706104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:13.206235886 CET44349706104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:13.206341982 CET49706443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:13.207082987 CET49706443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:13.211364031 CET4970480192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:13.212584019 CET4970780192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:13.332983017 CET8049704193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:13.333004951 CET8049707193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:13.333093882 CET4970480192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:13.333137035 CET4970780192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:13.333329916 CET4970780192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:13.453808069 CET8049707193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:15.476186037 CET8049707193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:15.481429100 CET4970980192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:15.522258997 CET4970780192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:15.600990057 CET8049709193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:15.601125956 CET4970980192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:15.601291895 CET4970980192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:15.720712900 CET8049709193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:17.741354942 CET8049709193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:17.745183945 CET4970980192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:17.864855051 CET8049709193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:19.073693991 CET8049709193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:19.078927040 CET4972380192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:19.115994930 CET4970980192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:19.198561907 CET8049723193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:19.198678970 CET4972380192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:19.198787928 CET4972380192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:19.318377018 CET8049723193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:21.468491077 CET8049723193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:21.469259024 CET4970980192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:21.470160007 CET49731443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:21.470263958 CET44349731104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:21.470428944 CET49731443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:21.474442005 CET49731443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:21.474482059 CET44349731104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:21.522253036 CET4972380192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:21.589277983 CET8049709193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:21.589406967 CET4970980192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:22.731997013 CET44349731104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:22.746479034 CET49731443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:22.746555090 CET44349731104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:23.185483932 CET44349731104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:23.185550928 CET44349731104.21.67.152192.168.2.5
                                                            Nov 22, 2024 07:47:23.185622931 CET49731443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:23.186120033 CET49731443192.168.2.5104.21.67.152
                                                            Nov 22, 2024 07:47:23.189697027 CET4972380192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:23.190907001 CET4973380192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:23.309391975 CET8049723193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:23.309565067 CET4972380192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:23.310349941 CET8049733193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:23.310416937 CET4973380192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:23.310553074 CET4973380192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:47:23.429999113 CET8049733193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:25.458650112 CET8049733193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:47:25.506622076 CET4973380192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:48:20.475864887 CET8049707193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:48:20.478177071 CET4970780192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:48:30.466525078 CET8049733193.122.130.0192.168.2.5
                                                            Nov 22, 2024 07:48:30.466936111 CET4973380192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:49:03.194453001 CET4973380192.168.2.5193.122.130.0
                                                            Nov 22, 2024 07:49:03.314179897 CET8049733193.122.130.0192.168.2.5
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 22, 2024 07:47:03.215089083 CET5365353192.168.2.51.1.1.1
                                                            Nov 22, 2024 07:47:03.351866007 CET53536531.1.1.1192.168.2.5
                                                            Nov 22, 2024 07:47:08.435782909 CET4953053192.168.2.51.1.1.1
                                                            Nov 22, 2024 07:47:08.893973112 CET53495301.1.1.1192.168.2.5
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Nov 22, 2024 07:47:03.215089083 CET192.168.2.51.1.1.10x3e8fStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                            Nov 22, 2024 07:47:08.435782909 CET192.168.2.51.1.1.10xa0ddStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Nov 22, 2024 07:47:03.351866007 CET1.1.1.1192.168.2.50x3e8fNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                            Nov 22, 2024 07:47:03.351866007 CET1.1.1.1192.168.2.50x3e8fNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                            Nov 22, 2024 07:47:03.351866007 CET1.1.1.1192.168.2.50x3e8fNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                            Nov 22, 2024 07:47:03.351866007 CET1.1.1.1192.168.2.50x3e8fNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                            Nov 22, 2024 07:47:03.351866007 CET1.1.1.1192.168.2.50x3e8fNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                            Nov 22, 2024 07:47:03.351866007 CET1.1.1.1192.168.2.50x3e8fNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                            Nov 22, 2024 07:47:08.893973112 CET1.1.1.1192.168.2.50xa0ddNo error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                            Nov 22, 2024 07:47:08.893973112 CET1.1.1.1192.168.2.50xa0ddNo error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                            • reallyfreegeoip.org
                                                            • checkip.dyndns.org
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.549704193.122.130.0801560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 22, 2024 07:47:03.478424072 CET151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Nov 22, 2024 07:47:05.629949093 CET320INHTTP/1.1 200 OK
                                                            Date: Fri, 22 Nov 2024 06:47:05 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: bbd7e48c402ec7c0451b255cd49f53ac
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                                            Nov 22, 2024 07:47:05.667089939 CET127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Nov 22, 2024 07:47:06.986040115 CET730INHTTP/1.1 502 Bad Gateway
                                                            Date: Fri, 22 Nov 2024 06:47:06 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 547
                                                            Connection: keep-alive
                                                            X-Request-ID: 11a471d37a513bf69dd461ea13d5ff2f
                                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                            Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                                            Nov 22, 2024 07:47:07.003618002 CET127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Nov 22, 2024 07:47:08.372770071 CET320INHTTP/1.1 200 OK
                                                            Date: Fri, 22 Nov 2024 06:47:08 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: c8e94c3633d0a8761eaffc24377b479b
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                                            Nov 22, 2024 07:47:11.025480032 CET127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Nov 22, 2024 07:47:11.490664959 CET320INHTTP/1.1 200 OK
                                                            Date: Fri, 22 Nov 2024 06:47:11 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 15c80ca2bc01e7edfbdd01524331a18e
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.549707193.122.130.0801560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 22, 2024 07:47:13.333329916 CET127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Nov 22, 2024 07:47:15.476186037 CET730INHTTP/1.1 502 Bad Gateway
                                                            Date: Fri, 22 Nov 2024 06:47:15 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 547
                                                            Connection: keep-alive
                                                            X-Request-ID: 89cabba473d5c90f7af4aaecee8d3887
                                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                            Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.549709193.122.130.0801560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 22, 2024 07:47:15.601291895 CET151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Nov 22, 2024 07:47:17.741354942 CET730INHTTP/1.1 502 Bad Gateway
                                                            Date: Fri, 22 Nov 2024 06:47:17 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 547
                                                            Connection: keep-alive
                                                            X-Request-ID: 6c0d1336c788604ac7caeb7297559faf
                                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                            Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                                            Nov 22, 2024 07:47:17.745183945 CET127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Nov 22, 2024 07:47:19.073693991 CET730INHTTP/1.1 502 Bad Gateway
                                                            Date: Fri, 22 Nov 2024 06:47:18 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 547
                                                            Connection: keep-alive
                                                            X-Request-ID: bd8c59d21224585c7620d1f502652f36
                                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                            Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.549723193.122.130.0801560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 22, 2024 07:47:19.198787928 CET151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Nov 22, 2024 07:47:21.468491077 CET320INHTTP/1.1 200 OK
                                                            Date: Fri, 22 Nov 2024 06:47:21 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 554a5dd7cd43ef30dfed750f2fed370d
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.549733193.122.130.0801560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 22, 2024 07:47:23.310553074 CET151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Nov 22, 2024 07:47:25.458650112 CET730INHTTP/1.1 502 Bad Gateway
                                                            Date: Fri, 22 Nov 2024 06:47:25 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 547
                                                            Connection: keep-alive
                                                            X-Request-ID: 83c97f911752223bb2aa9ebc497f0035
                                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                            Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.549705104.21.67.1524431560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-11-22 06:47:10 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-11-22 06:47:10 UTC854INHTTP/1.1 200 OK
                                                            Date: Fri, 22 Nov 2024 06:47:10 GMT
                                                            Content-Type: text/xml
                                                            Content-Length: 361
                                                            Connection: close
                                                            Cache-Control: max-age=31536000
                                                            CF-Cache-Status: HIT
                                                            Age: 221939
                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                            Accept-Ranges: bytes
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WgMUxo%2BpmQ5rAPGyvCL4P%2BQMQlMBUu8wtal7aTW3GyDTwvK2%2B2jcXrsBZ5KyPrR6QijGOXOx9TrPPZMorV%2BIdoPb5pBDj5lHQz8sUXkVdXISojxdysPA3CTpwcGZYI2ZvH%2Fi74LY"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8e66f7749b8e43d0-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2196&sent=7&recv=8&lost=0&retrans=1&sent_bytes=4236&recv_bytes=698&delivery_rate=219565&cwnd=173&unsent_bytes=0&cid=55d02d754e4a727b&ts=795&x=0"
                                                            2024-11-22 06:47:10 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.549706104.21.67.1524431560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-11-22 06:47:12 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-11-22 06:47:13 UTC857INHTTP/1.1 200 OK
                                                            Date: Fri, 22 Nov 2024 06:47:13 GMT
                                                            Content-Type: text/xml
                                                            Content-Length: 361
                                                            Connection: close
                                                            Cache-Control: max-age=31536000
                                                            CF-Cache-Status: HIT
                                                            Age: 221942
                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                            Accept-Ranges: bytes
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3jM0P%2B2KcsVHsruROFoJjxc2FhhAiH3d%2B0DGFSPkgMFeHc5UWxOIlbQEJXW8N9a%2BSpdxsrBJN1ripkYlsi%2FbvxLSEeabMpDLKWwhrS2%2FFGoS4RzSASIfSZWic%2BhdUOT4ypugrzIV"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8e66f7826b704268-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1601&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1768625&cwnd=252&unsent_bytes=0&cid=775694cd09e67cb8&ts=460&x=0"
                                                            2024-11-22 06:47:13 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.549731104.21.67.1524431560C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-11-22 06:47:22 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-11-22 06:47:23 UTC849INHTTP/1.1 200 OK
                                                            Date: Fri, 22 Nov 2024 06:47:23 GMT
                                                            Content-Type: text/xml
                                                            Content-Length: 361
                                                            Connection: close
                                                            Cache-Control: max-age=31536000
                                                            CF-Cache-Status: HIT
                                                            Age: 221952
                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                            Accept-Ranges: bytes
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=h8G1p5srbu9i2OF1w%2F1wGSet2pBNqtQ4TEw%2ByndWnKSCondAe9Uckplv5cThulMexk95v7mo133AFh2XRghVzgZy6SlSWdzfvIBp2RJtf8fOnjmlyLJTYFxD7JwHWjOQZJAkqNZe"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8e66f7c0ce5f440e-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1764&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1586956&cwnd=230&unsent_bytes=0&cid=0e5875c39c7e9582&ts=458&x=0"
                                                            2024-11-22 06:47:23 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:01:46:59
                                                            Start date:22/11/2024
                                                            Path:C:\Users\user\Desktop\SOA SEP 2024.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\SOA SEP 2024.exe"
                                                            Imagebase:0x760000
                                                            File size:1'146'368 bytes
                                                            MD5 hash:3463C053C39DE2170AA78B8AA253E999
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.2102007208.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:2
                                                            Start time:01:47:01
                                                            Start date:22/11/2024
                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\SOA SEP 2024.exe"
                                                            Imagebase:0xc90000
                                                            File size:45'984 bytes
                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.4553786112.0000000003359000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                            • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000002.4555400632.0000000005750000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.4552483120.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000002.4555060395.0000000004171000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                            • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000002.4555306563.0000000005650000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000002.4553461018.0000000002EA4000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.4553786112.00000000031D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:3.5%
                                                              Dynamic/Decrypted Code Coverage:0.8%
                                                              Signature Coverage:4.5%
                                                              Total number of Nodes:1851
                                                              Total number of Limit Nodes:171
                                                              execution_graph 93683 7d19dd 93688 764a30 93683->93688 93685 7d19f1 93708 780f0a 52 API calls __cinit 93685->93708 93687 7d19fb 93689 764a40 __ftell_nolock 93688->93689 93709 76d7f7 93689->93709 93693 764aff 93721 76363c 93693->93721 93700 76d7f7 48 API calls 93701 764b32 93700->93701 93743 7649fb 93701->93743 93703 764b43 Mailbox 93703->93685 93704 7661a6 48 API calls 93707 764b3d _wcscat Mailbox __NMSG_WRITE 93704->93707 93706 7664cf 48 API calls 93706->93707 93707->93703 93707->93704 93707->93706 93757 76ce19 93707->93757 93708->93687 93763 77f4ea 93709->93763 93711 76d818 93712 77f4ea 48 API calls 93711->93712 93713 764af6 93712->93713 93714 765374 93713->93714 93794 78f8a0 93714->93794 93717 76ce19 48 API calls 93718 7653a7 93717->93718 93796 76660f 93718->93796 93720 7653b1 Mailbox 93720->93693 93722 763649 __ftell_nolock 93721->93722 93841 76366c GetFullPathNameW 93722->93841 93724 76365a 93725 766a63 48 API calls 93724->93725 93726 763669 93725->93726 93727 76518c 93726->93727 93728 765197 93727->93728 93729 7d1ace 93728->93729 93730 76519f 93728->93730 93853 766b4a 48 API calls 93729->93853 93843 765130 93730->93843 93733 764b18 93737 7664cf 93733->93737 93734 7d1adb __NMSG_WRITE 93735 77ee75 48 API calls 93734->93735 93736 7d1b07 ___crtGetEnvironmentStringsW 93735->93736 93738 76651b 93737->93738 93742 7664dd ___crtGetEnvironmentStringsW 93737->93742 93740 77f4ea 48 API calls 93738->93740 93739 77f4ea 48 API calls 93741 764b29 93739->93741 93740->93742 93741->93700 93742->93739 93860 76bcce 93743->93860 93746 7d41cc RegQueryValueExW 93748 7d41e5 93746->93748 93749 7d4246 RegCloseKey 93746->93749 93747 764a2b 93747->93707 93750 77f4ea 48 API calls 93748->93750 93751 7d41fe 93750->93751 93866 7647b7 93751->93866 93754 7d423b 93754->93749 93755 7d4224 93756 766a63 48 API calls 93755->93756 93756->93754 93758 76ce28 __NMSG_WRITE 93757->93758 93759 77ee75 48 API calls 93758->93759 93760 76ce50 ___crtGetEnvironmentStringsW 93759->93760 93761 77f4ea 48 API calls 93760->93761 93762 76ce66 93761->93762 93762->93707 93765 77f4f2 __calloc_impl 93763->93765 93766 77f50c 93765->93766 93767 77f50e std::exception::exception 93765->93767 93772 78395c 93765->93772 93766->93711 93786 786805 RaiseException 93767->93786 93769 77f538 93787 78673b 47 API calls _free 93769->93787 93771 77f54a 93771->93711 93773 7839d7 __calloc_impl 93772->93773 93781 783968 __calloc_impl 93772->93781 93793 787c0e 47 API calls __getptd_noexit 93773->93793 93776 78399b RtlAllocateHeap 93777 7839cf 93776->93777 93776->93781 93777->93765 93779 783973 93779->93781 93788 7881c2 47 API calls __NMSG_WRITE 93779->93788 93789 78821f 47 API calls 5 library calls 93779->93789 93790 781145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 93779->93790 93780 7839c3 93791 787c0e 47 API calls __getptd_noexit 93780->93791 93781->93776 93781->93779 93781->93780 93784 7839c1 93781->93784 93792 787c0e 47 API calls __getptd_noexit 93784->93792 93786->93769 93787->93771 93788->93779 93789->93779 93791->93784 93792->93777 93793->93777 93795 765381 GetModuleFileNameW 93794->93795 93795->93717 93797 78f8a0 __ftell_nolock 93796->93797 93798 76661c GetFullPathNameW 93797->93798 93803 766a63 93798->93803 93800 766643 93814 766571 93800->93814 93804 766adf 93803->93804 93807 766a6f __NMSG_WRITE 93803->93807 93829 76b18b 93804->93829 93806 766ab6 ___crtGetEnvironmentStringsW 93806->93800 93808 766ad7 93807->93808 93809 766a8b 93807->93809 93828 76c369 48 API calls 93808->93828 93818 766b4a 48 API calls 93809->93818 93812 766a95 93819 77ee75 93812->93819 93815 76657f 93814->93815 93816 76b18b 48 API calls 93815->93816 93817 76658f 93816->93817 93817->93720 93818->93812 93821 77f4ea __calloc_impl 93819->93821 93820 78395c __malloc_crt 47 API calls 93820->93821 93821->93820 93822 77f50c 93821->93822 93823 77f50e std::exception::exception 93821->93823 93822->93806 93833 786805 RaiseException 93823->93833 93825 77f538 93834 78673b 47 API calls _free 93825->93834 93827 77f54a 93827->93806 93828->93806 93830 76b199 93829->93830 93832 76b1a2 ___crtGetEnvironmentStringsW 93829->93832 93830->93832 93835 76bdfa 93830->93835 93832->93806 93833->93825 93834->93827 93836 76be0d 93835->93836 93837 76be0a ___crtGetEnvironmentStringsW 93835->93837 93838 77f4ea 48 API calls 93836->93838 93837->93832 93839 76be17 93838->93839 93840 77ee75 48 API calls 93839->93840 93840->93837 93842 76368a 93841->93842 93842->93724 93844 76513f __NMSG_WRITE 93843->93844 93845 765151 93844->93845 93846 7d1b27 93844->93846 93854 76bb85 93845->93854 93859 766b4a 48 API calls 93846->93859 93849 76515e ___crtGetEnvironmentStringsW 93849->93733 93850 7d1b34 93851 77ee75 48 API calls 93850->93851 93852 7d1b57 ___crtGetEnvironmentStringsW 93851->93852 93853->93734 93855 76bb9b 93854->93855 93857 76bb96 ___crtGetEnvironmentStringsW 93854->93857 93856 77ee75 48 API calls 93855->93856 93858 7d1b77 93855->93858 93856->93857 93857->93849 93858->93858 93859->93850 93861 76bce8 93860->93861 93865 764a0a RegOpenKeyExW 93860->93865 93862 77f4ea 48 API calls 93861->93862 93863 76bcf2 93862->93863 93864 77ee75 48 API calls 93863->93864 93864->93865 93865->93746 93865->93747 93867 77f4ea 48 API calls 93866->93867 93868 7647c9 RegQueryValueExW 93867->93868 93868->93754 93868->93755 93869 763742 93870 76374b 93869->93870 93871 7637c8 93870->93871 93872 763769 93870->93872 93909 7637c6 93870->93909 93874 7637ce 93871->93874 93875 7d1e00 93871->93875 93876 763776 93872->93876 93877 76382c PostQuitMessage 93872->93877 93873 7637ab DefWindowProcW 93911 7637b9 93873->93911 93878 7637f6 SetTimer RegisterWindowMessageW 93874->93878 93879 7637d3 93874->93879 93924 762ff6 16 API calls 93875->93924 93881 7d1e88 93876->93881 93882 763781 93876->93882 93877->93911 93886 76381f CreatePopupMenu 93878->93886 93878->93911 93883 7637da KillTimer 93879->93883 93884 7d1da3 93879->93884 93930 7a4ddd 60 API calls _memset 93881->93930 93887 763836 93882->93887 93888 763789 93882->93888 93921 763847 Shell_NotifyIconW _memset 93883->93921 93891 7d1ddc MoveWindow 93884->93891 93892 7d1da8 93884->93892 93885 7d1e27 93925 77e312 346 API calls Mailbox 93885->93925 93886->93911 93914 77eb83 93887->93914 93895 7d1e6d 93888->93895 93896 763794 93888->93896 93891->93911 93898 7d1dac 93892->93898 93899 7d1dcb SetFocus 93892->93899 93895->93873 93929 79a5f3 48 API calls 93895->93929 93901 76379f 93896->93901 93902 7d1e58 93896->93902 93897 7d1e9a 93897->93873 93897->93911 93898->93901 93903 7d1db5 93898->93903 93899->93911 93900 7637ed 93922 76390f DeleteObject DestroyWindow Mailbox 93900->93922 93901->93873 93926 763847 Shell_NotifyIconW _memset 93901->93926 93928 7a55bd 70 API calls _memset 93902->93928 93923 762ff6 16 API calls 93903->93923 93908 7d1e68 93908->93911 93909->93873 93912 7d1e4c 93927 764ffc 67 API calls _memset 93912->93927 93915 77ec1c 93914->93915 93916 77eb9a _memset 93914->93916 93915->93911 93931 7651af 93916->93931 93918 77ec05 KillTimer SetTimer 93918->93915 93919 7d3c7a Shell_NotifyIconW 93919->93918 93920 77ebc1 93920->93918 93920->93919 93921->93900 93922->93911 93923->93911 93924->93885 93925->93901 93926->93912 93927->93909 93928->93908 93929->93909 93930->93897 93932 7651cb 93931->93932 93952 7652a2 Mailbox 93931->93952 93953 766b0f 48 API calls 93932->93953 93934 7651d9 93935 7651e6 93934->93935 93936 7d3ca1 LoadStringW 93934->93936 93937 766a63 48 API calls 93935->93937 93939 7d3cbb 93936->93939 93938 7651fb 93937->93938 93938->93939 93940 76520c 93938->93940 93941 76510d 48 API calls 93939->93941 93942 765216 93940->93942 93943 7652a7 93940->93943 93946 7d3cc5 93941->93946 93954 76510d 93942->93954 93963 766eed 93943->93963 93947 76518c 48 API calls 93946->93947 93949 765220 _memset _wcscpy 93946->93949 93948 7d3ce7 93947->93948 93951 76518c 48 API calls 93948->93951 93950 765288 Shell_NotifyIconW 93949->93950 93950->93952 93951->93949 93952->93920 93953->93934 93955 76511f 93954->93955 93956 7d1be7 93954->93956 93967 76b384 93955->93967 93976 79a58f 48 API calls ___crtGetEnvironmentStringsW 93956->93976 93959 76512b 93959->93949 93960 7d1bf1 93961 766eed 48 API calls 93960->93961 93962 7d1bf9 Mailbox 93961->93962 93964 766f00 93963->93964 93965 766ef8 93963->93965 93964->93949 93977 76dd47 48 API calls ___crtGetEnvironmentStringsW 93965->93977 93968 76b392 93967->93968 93975 76b3c5 ___crtGetEnvironmentStringsW 93967->93975 93969 76b3fd 93968->93969 93970 76b3b8 93968->93970 93968->93975 93972 77f4ea 48 API calls 93969->93972 93971 76bb85 48 API calls 93970->93971 93971->93975 93973 76b407 93972->93973 93974 77f4ea 48 API calls 93973->93974 93974->93975 93975->93959 93976->93960 93977->93964 93978 7d8eb8 93982 7aa635 93978->93982 93980 7d8ec3 93981 7aa635 84 API calls 93980->93981 93981->93980 93983 7aa66f 93982->93983 93988 7aa642 93982->93988 93983->93980 93984 7aa671 94014 77ec4e 81 API calls 93984->94014 93985 7aa676 93993 76936c 93985->93993 93988->93983 93988->93984 93988->93985 93991 7aa669 93988->93991 93989 7aa67d 93990 76510d 48 API calls 93989->93990 93990->93983 94013 774525 61 API calls ___crtGetEnvironmentStringsW 93991->94013 93994 769384 93993->93994 93995 769380 93993->93995 93996 7d4cbd __i64tow 93994->93996 93997 7d4bbf 93994->93997 93998 769398 93994->93998 94006 7693b0 __itow Mailbox _wcscpy 93994->94006 93995->93989 93999 7d4bc8 93997->93999 94000 7d4ca5 93997->94000 94015 78172b 80 API calls 3 library calls 93998->94015 94005 7d4be7 93999->94005 93999->94006 94016 78172b 80 API calls 3 library calls 94000->94016 94003 77f4ea 48 API calls 94004 7693ba 94003->94004 94004->93995 94008 76ce19 48 API calls 94004->94008 94007 77f4ea 48 API calls 94005->94007 94006->94003 94009 7d4c04 94007->94009 94008->93995 94010 77f4ea 48 API calls 94009->94010 94011 7d4c2a 94010->94011 94011->93995 94012 76ce19 48 API calls 94011->94012 94012->93995 94013->93983 94014->93985 94015->94006 94016->94006 94017 785dfd 94018 785e09 __tzset_nolock 94017->94018 94054 787eeb GetStartupInfoW 94018->94054 94020 785e0e 94056 789ca7 GetProcessHeap 94020->94056 94022 785e66 94023 785e71 94022->94023 94138 785f4d 47 API calls 3 library calls 94022->94138 94057 787b47 94023->94057 94026 785e77 94027 785e82 __RTC_Initialize 94026->94027 94139 785f4d 47 API calls 3 library calls 94026->94139 94078 78acb3 94027->94078 94030 785e91 94031 785e9d GetCommandLineW 94030->94031 94140 785f4d 47 API calls 3 library calls 94030->94140 94097 792e7d GetEnvironmentStringsW 94031->94097 94035 785e9c 94035->94031 94037 785eb7 94038 785ec2 94037->94038 94141 78115b 47 API calls 3 library calls 94037->94141 94107 792cb4 94038->94107 94041 785ec8 94042 785ed3 94041->94042 94142 78115b 47 API calls 3 library calls 94041->94142 94121 781195 94042->94121 94045 785edb 94046 785ee6 __wwincmdln 94045->94046 94143 78115b 47 API calls 3 library calls 94045->94143 94125 763a0f 94046->94125 94049 785efa 94050 785f09 94049->94050 94144 7813f1 47 API calls _doexit 94049->94144 94145 781186 47 API calls _doexit 94050->94145 94053 785f0e __tzset_nolock 94055 787f01 94054->94055 94055->94020 94056->94022 94146 78123a 30 API calls 2 library calls 94057->94146 94059 787b4c 94147 787e23 InitializeCriticalSectionAndSpinCount 94059->94147 94061 787b51 94062 787b55 94061->94062 94149 787e6d TlsAlloc 94061->94149 94148 787bbd 50 API calls 2 library calls 94062->94148 94065 787b5a 94065->94026 94066 787b67 94066->94062 94067 787b72 94066->94067 94150 786986 94067->94150 94070 787bb4 94158 787bbd 50 API calls 2 library calls 94070->94158 94073 787bb9 94073->94026 94074 787b93 94074->94070 94075 787b99 94074->94075 94157 787a94 47 API calls 4 library calls 94075->94157 94077 787ba1 GetCurrentThreadId 94077->94026 94079 78acbf __tzset_nolock 94078->94079 94167 787cf4 94079->94167 94081 78acc6 94082 786986 __calloc_crt 47 API calls 94081->94082 94084 78acd7 94082->94084 94083 78ace2 __tzset_nolock @_EH4_CallFilterFunc@8 94083->94030 94084->94083 94085 78ad42 GetStartupInfoW 94084->94085 94091 78ad57 94085->94091 94093 78ae80 94085->94093 94086 78af44 94174 78af58 LeaveCriticalSection _doexit 94086->94174 94088 78aec9 GetStdHandle 94088->94093 94089 786986 __calloc_crt 47 API calls 94089->94091 94090 78aedb GetFileType 94090->94093 94091->94089 94092 78ada5 94091->94092 94091->94093 94092->94093 94095 78ade5 InitializeCriticalSectionAndSpinCount 94092->94095 94096 78add7 GetFileType 94092->94096 94093->94086 94093->94088 94093->94090 94094 78af08 InitializeCriticalSectionAndSpinCount 94093->94094 94094->94093 94095->94092 94096->94092 94096->94095 94098 785ead 94097->94098 94100 792e8e 94097->94100 94103 792a7b GetModuleFileNameW 94098->94103 94099 7869d0 __malloc_crt 47 API calls 94101 792eb4 ___crtGetEnvironmentStringsW 94099->94101 94100->94099 94102 792eca FreeEnvironmentStringsW 94101->94102 94102->94098 94104 792aaf _wparse_cmdline 94103->94104 94105 7869d0 __malloc_crt 47 API calls 94104->94105 94106 792aef _wparse_cmdline 94104->94106 94105->94106 94106->94037 94108 792ccd __NMSG_WRITE 94107->94108 94112 792cc5 94107->94112 94109 786986 __calloc_crt 47 API calls 94108->94109 94117 792cf6 __NMSG_WRITE 94109->94117 94110 792d4d 94111 781c9d _free 47 API calls 94110->94111 94111->94112 94112->94041 94113 786986 __calloc_crt 47 API calls 94113->94117 94114 792d72 94116 781c9d _free 47 API calls 94114->94116 94116->94112 94117->94110 94117->94112 94117->94113 94117->94114 94118 792d89 94117->94118 94217 792567 47 API calls _fprintf 94117->94217 94218 786e20 IsProcessorFeaturePresent 94118->94218 94120 792d95 94120->94041 94122 7811a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 94121->94122 94124 7811e0 __IsNonwritableInCurrentImage 94122->94124 94241 780f0a 52 API calls __cinit 94122->94241 94124->94045 94126 7d1ebf 94125->94126 94127 763a29 94125->94127 94128 763a63 IsThemeActive 94127->94128 94242 781405 94128->94242 94132 763a8f 94254 763adb SystemParametersInfoW SystemParametersInfoW 94132->94254 94134 763a9b 94255 763d19 94134->94255 94136 763aa3 SystemParametersInfoW 94137 763ac8 94136->94137 94137->94049 94138->94023 94139->94027 94140->94035 94144->94050 94145->94053 94146->94059 94147->94061 94148->94065 94149->94066 94153 78698d 94150->94153 94152 7869ca 94152->94070 94156 787ec9 TlsSetValue 94152->94156 94153->94152 94154 7869ab Sleep 94153->94154 94159 7930aa 94153->94159 94155 7869c2 94154->94155 94155->94152 94155->94153 94156->94074 94157->94077 94158->94073 94160 7930d0 __calloc_impl 94159->94160 94161 7930b5 94159->94161 94164 7930e0 HeapAlloc 94160->94164 94165 7930c6 94160->94165 94161->94160 94162 7930c1 94161->94162 94166 787c0e 47 API calls __getptd_noexit 94162->94166 94164->94160 94164->94165 94165->94153 94166->94165 94168 787d18 EnterCriticalSection 94167->94168 94169 787d05 94167->94169 94168->94081 94175 787d7c 94169->94175 94171 787d0b 94171->94168 94198 78115b 47 API calls 3 library calls 94171->94198 94174->94083 94176 787d88 __tzset_nolock 94175->94176 94177 787da9 94176->94177 94178 787d91 94176->94178 94183 787dc9 __tzset_nolock 94177->94183 94202 7869d0 94177->94202 94199 7881c2 47 API calls __NMSG_WRITE 94178->94199 94180 787d96 94200 78821f 47 API calls 5 library calls 94180->94200 94183->94171 94185 787d9d 94201 781145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 94185->94201 94186 787dd3 94190 787cf4 __lock 46 API calls 94186->94190 94187 787dc4 94208 787c0e 47 API calls __getptd_noexit 94187->94208 94192 787dda 94190->94192 94193 787de9 InitializeCriticalSectionAndSpinCount 94192->94193 94194 787dfe 94192->94194 94195 787e04 94193->94195 94209 781c9d 94194->94209 94215 787e1a LeaveCriticalSection _doexit 94195->94215 94199->94180 94200->94185 94204 7869de 94202->94204 94203 78395c __malloc_crt 46 API calls 94203->94204 94204->94203 94205 786a12 94204->94205 94206 7869f1 Sleep 94204->94206 94205->94186 94205->94187 94207 786a0a 94206->94207 94207->94204 94207->94205 94208->94183 94210 781ccf __dosmaperr 94209->94210 94211 781ca6 RtlFreeHeap 94209->94211 94210->94195 94211->94210 94212 781cbb 94211->94212 94216 787c0e 47 API calls __getptd_noexit 94212->94216 94214 781cc1 GetLastError 94214->94210 94215->94183 94216->94214 94217->94117 94219 786e2b 94218->94219 94224 786cb5 94219->94224 94223 786e46 94223->94120 94225 786ccf _memset __call_reportfault 94224->94225 94226 786cef IsDebuggerPresent 94225->94226 94232 7881ac SetUnhandledExceptionFilter UnhandledExceptionFilter 94226->94232 94228 786db3 __call_reportfault 94233 78a70c 94228->94233 94230 786dd6 94231 788197 GetCurrentProcess TerminateProcess 94230->94231 94231->94223 94232->94228 94234 78a714 94233->94234 94235 78a716 IsProcessorFeaturePresent 94233->94235 94234->94230 94237 7937b0 94235->94237 94240 79375f 5 API calls 2 library calls 94237->94240 94239 793893 94239->94230 94240->94239 94241->94124 94243 787cf4 __lock 47 API calls 94242->94243 94244 781410 94243->94244 94307 787e58 LeaveCriticalSection 94244->94307 94246 763a88 94247 78146d 94246->94247 94248 781491 94247->94248 94249 781477 94247->94249 94248->94132 94249->94248 94308 787c0e 47 API calls __getptd_noexit 94249->94308 94251 781481 94309 786e10 8 API calls _fprintf 94251->94309 94253 78148c 94253->94132 94254->94134 94256 763d26 __ftell_nolock 94255->94256 94257 76d7f7 48 API calls 94256->94257 94258 763d31 GetCurrentDirectoryW 94257->94258 94310 7661ca 94258->94310 94260 763d57 IsDebuggerPresent 94261 763d65 94260->94261 94262 7d1cc1 MessageBoxA 94260->94262 94263 763e3a 94261->94263 94265 7d1cd9 94261->94265 94266 763d82 94261->94266 94262->94265 94264 763e41 SetCurrentDirectoryW 94263->94264 94267 763e4e Mailbox 94264->94267 94487 77c682 48 API calls 94265->94487 94384 7640e5 94266->94384 94267->94136 94270 7d1ce9 94275 7d1cff SetCurrentDirectoryW 94270->94275 94272 763da0 GetFullPathNameW 94273 766a63 48 API calls 94272->94273 94274 763ddb 94273->94274 94400 766430 94274->94400 94275->94267 94278 763df6 94279 763e00 94278->94279 94488 7a71fa AllocateAndInitializeSid CheckTokenMembership FreeSid 94278->94488 94416 763e6e GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 94279->94416 94282 7d1d1c 94282->94279 94285 7d1d2d 94282->94285 94286 765374 50 API calls 94285->94286 94289 7d1d35 94286->94289 94287 763e1f 94424 76e8d0 94287->94424 94288 763e0a 94288->94287 94485 764ffc 67 API calls _memset 94288->94485 94292 76ce19 48 API calls 94289->94292 94294 7d1d42 94292->94294 94295 7d1d6e 94294->94295 94296 7d1d49 94294->94296 94299 76518c 48 API calls 94295->94299 94298 76518c 48 API calls 94296->94298 94301 7d1d54 94298->94301 94300 7d1d6a GetForegroundWindow ShellExecuteW 94299->94300 94304 7d1d9e Mailbox 94300->94304 94303 76510d 48 API calls 94301->94303 94305 7d1d61 94303->94305 94304->94263 94306 76518c 48 API calls 94305->94306 94306->94300 94307->94246 94308->94251 94309->94253 94489 77e99b 94310->94489 94314 7661eb 94315 765374 50 API calls 94314->94315 94316 7661ff 94315->94316 94317 76ce19 48 API calls 94316->94317 94318 76620c 94317->94318 94506 7639db 94318->94506 94320 766216 Mailbox 94321 766eed 48 API calls 94320->94321 94322 76622b 94321->94322 94518 769048 94322->94518 94325 76ce19 48 API calls 94326 766244 94325->94326 94521 76d6e9 94326->94521 94328 766254 Mailbox 94329 76ce19 48 API calls 94328->94329 94330 76627c 94329->94330 94331 76d6e9 55 API calls 94330->94331 94332 76628f Mailbox 94331->94332 94333 76ce19 48 API calls 94332->94333 94334 7662a0 94333->94334 94525 76d645 94334->94525 94336 7662b2 Mailbox 94337 76d7f7 48 API calls 94336->94337 94338 7662c5 94337->94338 94535 7663fc 94338->94535 94342 7662df 94343 7d1c08 94342->94343 94344 7662e9 94342->94344 94346 7663fc 48 API calls 94343->94346 94345 780fa7 _W_store_winword 59 API calls 94344->94345 94347 7662f4 94345->94347 94348 7d1c1c 94346->94348 94347->94348 94349 7662fe 94347->94349 94351 7663fc 48 API calls 94348->94351 94350 780fa7 _W_store_winword 59 API calls 94349->94350 94352 766309 94350->94352 94353 7d1c38 94351->94353 94352->94353 94354 766313 94352->94354 94355 765374 50 API calls 94353->94355 94356 780fa7 _W_store_winword 59 API calls 94354->94356 94357 7d1c5d 94355->94357 94358 76631e 94356->94358 94359 7663fc 48 API calls 94357->94359 94360 76635f 94358->94360 94361 7d1c86 94358->94361 94365 7663fc 48 API calls 94358->94365 94363 7d1c69 94359->94363 94360->94361 94362 76636c 94360->94362 94366 766eed 48 API calls 94361->94366 94551 77c050 94362->94551 94364 766eed 48 API calls 94363->94364 94368 7d1c77 94364->94368 94369 766342 94365->94369 94370 7d1ca8 94366->94370 94372 7663fc 48 API calls 94368->94372 94373 766eed 48 API calls 94369->94373 94374 7663fc 48 API calls 94370->94374 94371 766384 94562 771b90 94371->94562 94372->94361 94376 766350 94373->94376 94377 7d1cb5 94374->94377 94378 7663fc 48 API calls 94376->94378 94377->94377 94378->94360 94379 771b90 48 API calls 94381 766394 94379->94381 94381->94379 94382 7663fc 48 API calls 94381->94382 94383 7663d6 Mailbox 94381->94383 94578 766b68 48 API calls 94381->94578 94382->94381 94383->94260 94385 7640f2 __ftell_nolock 94384->94385 94386 7d370e _memset 94385->94386 94387 76410b 94385->94387 94389 7d372a GetOpenFileNameW 94386->94389 94388 76660f 49 API calls 94387->94388 94390 764114 94388->94390 94391 7d3779 94389->94391 95206 7640a7 94390->95206 94393 766a63 48 API calls 94391->94393 94396 7d378e 94393->94396 94396->94396 94397 764129 95224 764139 94397->95224 94401 76643d __ftell_nolock 94400->94401 95434 764c75 94401->95434 94403 766442 94415 763dee 94403->94415 95445 765928 86 API calls 94403->95445 94405 76644f 94405->94415 95446 765798 88 API calls Mailbox 94405->95446 94407 766458 94408 76645c GetFullPathNameW 94407->94408 94407->94415 94409 766a63 48 API calls 94408->94409 94410 766488 94409->94410 94411 766a63 48 API calls 94410->94411 94412 766495 94411->94412 94413 766a63 48 API calls 94412->94413 94414 7d5dcf _wcscat 94412->94414 94413->94415 94415->94270 94415->94278 94417 7d1cba 94416->94417 94418 763ed8 94416->94418 95449 764024 94418->95449 94422 763e05 94423 7636b8 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 94422->94423 94423->94288 94425 76e8f6 94424->94425 94484 76e906 Mailbox 94424->94484 94427 76ed52 94425->94427 94425->94484 94426 7acc5c 86 API calls 94426->94484 95550 77e3cd 346 API calls 94427->95550 94429 76ebc7 94430 763e2a 94429->94430 95551 762ff6 16 API calls 94429->95551 94430->94263 94486 763847 Shell_NotifyIconW _memset 94430->94486 94432 76ed63 94432->94430 94433 76ed70 94432->94433 95552 77e312 346 API calls Mailbox 94433->95552 94435 76e94c PeekMessageW 94435->94484 94436 7d526e Sleep 94436->94484 94437 76ed77 LockWindowUpdate DestroyWindow GetMessageW 94437->94430 94438 76eda9 94437->94438 94441 7d59ef TranslateMessage DispatchMessageW GetMessageW 94438->94441 94441->94441 94442 7d5a1f 94441->94442 94442->94430 94443 761caa 49 API calls 94443->94484 94444 77f4ea 48 API calls 94444->94484 94445 76ed21 PeekMessageW 94445->94484 94446 76ebf7 timeGetTime 94446->94484 94448 766eed 48 API calls 94448->94484 94449 7d5557 WaitForSingleObject 94452 7d5574 GetExitCodeProcess CloseHandle 94449->94452 94449->94484 94450 762aae 322 API calls 94450->94484 94451 7d588f Sleep 94480 7d5429 Mailbox 94451->94480 94452->94484 94453 76ed3a TranslateMessage DispatchMessageW 94453->94445 94454 76d7f7 48 API calls 94454->94480 94455 76edae timeGetTime 95553 761caa 49 API calls 94455->95553 94457 7d5733 Sleep 94457->94480 94458 77dc38 timeGetTime 94458->94480 94461 7d5926 GetExitCodeProcess 94464 7d593c WaitForSingleObject 94461->94464 94465 7d5952 CloseHandle 94461->94465 94463 7d5445 Sleep 94463->94484 94464->94465 94464->94484 94465->94480 94466 7d5432 Sleep 94466->94463 94467 7c8c4b 108 API calls 94467->94480 94468 762c79 107 API calls 94468->94480 94470 7d59ae Sleep 94470->94484 94473 76ce19 48 API calls 94473->94480 94476 76d6e9 55 API calls 94476->94480 94480->94454 94480->94458 94480->94461 94480->94463 94480->94466 94480->94467 94480->94468 94480->94470 94480->94473 94480->94476 94480->94484 95555 7a4cbe 49 API calls Mailbox 94480->95555 95556 761caa 49 API calls 94480->95556 95557 762aae 346 API calls 94480->95557 95559 7bccb2 50 API calls 94480->95559 95560 7a7a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 94480->95560 95561 7a6532 63 API calls 3 library calls 94480->95561 94482 76ce19 48 API calls 94482->94484 94483 76d6e9 55 API calls 94483->94484 94484->94426 94484->94429 94484->94435 94484->94436 94484->94443 94484->94444 94484->94445 94484->94446 94484->94448 94484->94449 94484->94450 94484->94451 94484->94453 94484->94455 94484->94457 94484->94463 94484->94480 94484->94482 94484->94483 95454 76f110 94484->95454 95519 7745e0 94484->95519 95537 77e244 94484->95537 95542 77dc5f 94484->95542 95547 76eed0 346 API calls Mailbox 94484->95547 95548 76ef00 86 API calls 94484->95548 95549 773200 346 API calls 2 library calls 94484->95549 95554 7c8d23 48 API calls 94484->95554 95558 76fe30 346 API calls __cinit 94484->95558 94485->94287 94486->94263 94487->94270 94488->94282 94490 76d7f7 48 API calls 94489->94490 94491 7661db 94490->94491 94492 766009 94491->94492 94493 766016 __ftell_nolock 94492->94493 94494 766a63 48 API calls 94493->94494 94496 76617c Mailbox 94493->94496 94497 766048 94494->94497 94496->94314 94505 76607e Mailbox 94497->94505 94579 7661a6 94497->94579 94498 76614f 94498->94496 94499 76ce19 48 API calls 94498->94499 94501 766170 94499->94501 94500 76ce19 48 API calls 94500->94505 94502 7664cf 48 API calls 94501->94502 94502->94496 94503 7664cf 48 API calls 94503->94505 94504 7661a6 48 API calls 94504->94505 94505->94496 94505->94498 94505->94500 94505->94503 94505->94504 94582 7641a9 94506->94582 94509 763a06 94509->94320 94512 7d2ff0 94514 781c9d _free 47 API calls 94512->94514 94515 7d2ffd 94514->94515 94516 764252 84 API calls 94515->94516 94517 7d3006 94516->94517 94517->94517 94519 77f4ea 48 API calls 94518->94519 94520 766237 94519->94520 94520->94325 94522 76d6f4 94521->94522 94523 76d71b 94522->94523 95195 76d764 55 API calls 94522->95195 94523->94328 94526 76d654 94525->94526 94534 76d67e 94525->94534 94527 76d65b 94526->94527 94530 76d6c2 94526->94530 94528 76d6ab 94527->94528 94529 76d666 94527->94529 94528->94534 95197 77dce0 53 API calls 94528->95197 95196 76d9a0 53 API calls __cinit 94529->95196 94530->94528 95198 77dce0 53 API calls 94530->95198 94534->94336 94536 766406 94535->94536 94537 76641f 94535->94537 94538 766eed 48 API calls 94536->94538 94539 766a63 48 API calls 94537->94539 94540 7662d1 94538->94540 94539->94540 94541 780fa7 94540->94541 94542 781028 94541->94542 94543 780fb3 94541->94543 95201 78103a 59 API calls 3 library calls 94542->95201 94550 780fd8 94543->94550 95199 787c0e 47 API calls __getptd_noexit 94543->95199 94546 781035 94546->94342 94547 780fbf 95200 786e10 8 API calls _fprintf 94547->95200 94549 780fca 94549->94342 94550->94342 94552 77c064 94551->94552 94554 77c069 Mailbox 94551->94554 95202 77c1af 48 API calls 94552->95202 94560 77c077 94554->94560 95203 77c15c 48 API calls 94554->95203 94556 77f4ea 48 API calls 94558 77c108 94556->94558 94557 77c152 94557->94371 94559 77f4ea 48 API calls 94558->94559 94561 77c113 94559->94561 94560->94556 94560->94557 94561->94371 94563 771cf6 94562->94563 94564 771ba2 94562->94564 94563->94381 94566 77f4ea 48 API calls 94564->94566 94577 771bae 94564->94577 94567 7d49c4 94566->94567 94570 77f4ea 48 API calls 94567->94570 94568 771bb9 94569 771c5d 94568->94569 94571 77f4ea 48 API calls 94568->94571 94569->94381 94576 7d49cf 94570->94576 94572 771c9f 94571->94572 94573 771cb2 94572->94573 95204 762925 48 API calls 94572->95204 94573->94381 94575 77f4ea 48 API calls 94575->94576 94576->94575 94576->94577 94577->94568 95205 77c15c 48 API calls 94577->95205 94578->94381 94580 76bdfa 48 API calls 94579->94580 94581 7661b1 94580->94581 94581->94497 94647 764214 94582->94647 94587 7641d4 LoadLibraryExW 94657 764291 94587->94657 94588 7d4f73 94590 764252 84 API calls 94588->94590 94592 7d4f7a 94590->94592 94594 764291 3 API calls 94592->94594 94597 7d4f82 94594->94597 94595 7641fb 94596 764207 94595->94596 94595->94597 94599 764252 84 API calls 94596->94599 94683 7644ed 94597->94683 94601 7639fe 94599->94601 94601->94509 94606 7ac396 94601->94606 94603 7d4fa9 94691 764950 94603->94691 94605 7d4fb6 94607 764517 83 API calls 94606->94607 94608 7ac405 94607->94608 94980 7ac56d 94608->94980 94611 7644ed 64 API calls 94612 7ac432 94611->94612 94613 7644ed 64 API calls 94612->94613 94614 7ac442 94613->94614 94615 7644ed 64 API calls 94614->94615 94616 7ac45d 94615->94616 94617 7644ed 64 API calls 94616->94617 94618 7ac478 94617->94618 94619 764517 83 API calls 94618->94619 94620 7ac48f 94619->94620 94621 78395c __malloc_crt 47 API calls 94620->94621 94622 7ac496 94621->94622 94623 78395c __malloc_crt 47 API calls 94622->94623 94624 7ac4a0 94623->94624 94625 7644ed 64 API calls 94624->94625 94626 7ac4b4 94625->94626 94627 7abf5a GetSystemTimeAsFileTime 94626->94627 94628 7ac4c7 94627->94628 94629 7ac4dc 94628->94629 94630 7ac4f1 94628->94630 94631 781c9d _free 47 API calls 94629->94631 94632 7ac556 94630->94632 94633 7ac4f7 94630->94633 94635 7ac4e2 94631->94635 94634 781c9d _free 47 API calls 94632->94634 94986 7ab965 94633->94986 94637 7ac41b 94634->94637 94638 781c9d _free 47 API calls 94635->94638 94637->94512 94641 764252 94637->94641 94638->94637 94640 781c9d _free 47 API calls 94640->94637 94642 76425c 94641->94642 94644 764263 94641->94644 94643 7835e4 __fcloseall 83 API calls 94642->94643 94643->94644 94645 764272 94644->94645 94646 764283 FreeLibrary 94644->94646 94645->94512 94646->94645 94696 764339 94647->94696 94650 76423c 94651 764244 FreeLibrary 94650->94651 94652 7641bb 94650->94652 94651->94652 94654 783499 94652->94654 94704 7834ae 94654->94704 94656 7641c8 94656->94587 94656->94588 94782 7642e4 94657->94782 94661 7642c1 FreeLibrary 94662 7641ec 94661->94662 94664 764380 94662->94664 94663 7642b8 94663->94661 94663->94662 94665 77f4ea 48 API calls 94664->94665 94666 764395 94665->94666 94667 7647b7 48 API calls 94666->94667 94668 7643a1 ___crtGetEnvironmentStringsW 94667->94668 94669 7643dc 94668->94669 94671 7644d1 94668->94671 94672 764499 94668->94672 94670 764950 57 API calls 94669->94670 94675 7643e5 94670->94675 94801 7ac750 93 API calls 94671->94801 94790 76406b CreateStreamOnHGlobal 94672->94790 94676 7644ed 64 API calls 94675->94676 94678 7d4ed7 94675->94678 94682 764479 94675->94682 94796 764517 94675->94796 94676->94675 94679 764517 83 API calls 94678->94679 94680 7d4eeb 94679->94680 94681 7644ed 64 API calls 94680->94681 94681->94682 94682->94595 94684 7644ff 94683->94684 94687 7d4fc0 94683->94687 94825 78381e 94684->94825 94688 7abf5a 94957 7abdb4 94688->94957 94690 7abf70 94690->94603 94692 76495f 94691->94692 94693 7d5002 94691->94693 94962 783e65 94692->94962 94695 764967 94695->94605 94700 76434b 94696->94700 94699 764321 LoadLibraryA GetProcAddress 94699->94650 94701 76422f 94700->94701 94702 764354 LoadLibraryA 94700->94702 94701->94650 94701->94699 94702->94701 94703 764365 GetProcAddress 94702->94703 94703->94701 94707 7834ba __tzset_nolock 94704->94707 94705 7834cd 94752 787c0e 47 API calls __getptd_noexit 94705->94752 94707->94705 94709 7834fe 94707->94709 94708 7834d2 94753 786e10 8 API calls _fprintf 94708->94753 94723 78e4c8 94709->94723 94712 783503 94713 783519 94712->94713 94714 78350c 94712->94714 94716 783543 94713->94716 94717 783523 94713->94717 94754 787c0e 47 API calls __getptd_noexit 94714->94754 94737 78e5e0 94716->94737 94755 787c0e 47 API calls __getptd_noexit 94717->94755 94719 7834dd __tzset_nolock @_EH4_CallFilterFunc@8 94719->94656 94724 78e4d4 __tzset_nolock 94723->94724 94725 787cf4 __lock 47 API calls 94724->94725 94735 78e4e2 94725->94735 94726 78e559 94728 7869d0 __malloc_crt 47 API calls 94726->94728 94730 78e560 94728->94730 94729 78e5cc __tzset_nolock 94729->94712 94731 78e56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 94730->94731 94734 78e552 94730->94734 94731->94734 94732 787d7c __mtinitlocknum 47 API calls 94732->94735 94757 78e5d7 94734->94757 94735->94726 94735->94732 94735->94734 94760 784e5b 48 API calls __lock 94735->94760 94761 784ec5 LeaveCriticalSection LeaveCriticalSection _doexit 94735->94761 94746 78e600 __wopenfile 94737->94746 94738 78e61a 94766 787c0e 47 API calls __getptd_noexit 94738->94766 94740 78e7d5 94740->94738 94744 78e838 94740->94744 94741 78e61f 94767 786e10 8 API calls _fprintf 94741->94767 94743 78354e 94756 783570 LeaveCriticalSection LeaveCriticalSection _fseek 94743->94756 94763 7963c9 94744->94763 94746->94738 94746->94740 94746->94746 94768 78185b 59 API calls 2 library calls 94746->94768 94748 78e7ce 94748->94740 94769 78185b 59 API calls 2 library calls 94748->94769 94750 78e7ed 94750->94740 94770 78185b 59 API calls 2 library calls 94750->94770 94752->94708 94753->94719 94754->94719 94755->94719 94756->94719 94762 787e58 LeaveCriticalSection 94757->94762 94759 78e5de 94759->94729 94760->94735 94761->94735 94762->94759 94771 795bb1 94763->94771 94765 7963e2 94765->94743 94766->94741 94767->94743 94768->94748 94769->94750 94770->94740 94772 795bbd __tzset_nolock 94771->94772 94773 795bcf 94772->94773 94775 795c06 94772->94775 94774 787c0e _fprintf 47 API calls 94773->94774 94776 795bd4 94774->94776 94777 795c78 __wsopen_helper 110 API calls 94775->94777 94778 786e10 _fprintf 8 API calls 94776->94778 94779 795c23 94777->94779 94781 795bde __tzset_nolock 94778->94781 94780 795c4c __wsopen_helper LeaveCriticalSection 94779->94780 94780->94781 94781->94765 94786 7642f6 94782->94786 94785 7642cc LoadLibraryA GetProcAddress 94785->94663 94787 7642aa 94786->94787 94788 7642ff LoadLibraryA 94786->94788 94787->94663 94787->94785 94788->94787 94789 764310 GetProcAddress 94788->94789 94789->94787 94791 764085 FindResourceExW 94790->94791 94795 7640a2 94790->94795 94792 7d4f16 LoadResource 94791->94792 94791->94795 94793 7d4f2b SizeofResource 94792->94793 94792->94795 94794 7d4f3f LockResource 94793->94794 94793->94795 94794->94795 94795->94669 94797 764526 94796->94797 94798 7d4fe0 94796->94798 94802 783a8d 94797->94802 94800 764534 94800->94675 94801->94669 94803 783a99 __tzset_nolock 94802->94803 94804 783aa7 94803->94804 94806 783acd 94803->94806 94815 787c0e 47 API calls __getptd_noexit 94804->94815 94817 784e1c 94806->94817 94807 783aac 94816 786e10 8 API calls _fprintf 94807->94816 94810 783ad3 94823 7839fe 81 API calls 4 library calls 94810->94823 94812 783ae2 94824 783b04 LeaveCriticalSection LeaveCriticalSection _fseek 94812->94824 94814 783ab7 __tzset_nolock 94814->94800 94815->94807 94816->94814 94818 784e2c 94817->94818 94819 784e4e EnterCriticalSection 94817->94819 94818->94819 94820 784e34 94818->94820 94821 784e44 94819->94821 94822 787cf4 __lock 47 API calls 94820->94822 94821->94810 94822->94821 94823->94812 94824->94814 94828 783839 94825->94828 94827 764510 94827->94688 94830 783845 __tzset_nolock 94828->94830 94829 783880 __tzset_nolock 94829->94827 94830->94829 94831 783888 94830->94831 94832 78385b _memset 94830->94832 94833 784e1c __lock_file 48 API calls 94831->94833 94855 787c0e 47 API calls __getptd_noexit 94832->94855 94834 78388e 94833->94834 94841 78365b 94834->94841 94837 783875 94856 786e10 8 API calls _fprintf 94837->94856 94843 783676 _memset 94841->94843 94847 783691 94841->94847 94842 783681 94953 787c0e 47 API calls __getptd_noexit 94842->94953 94843->94842 94843->94847 94852 7836cf 94843->94852 94845 783686 94954 786e10 8 API calls _fprintf 94845->94954 94857 7838c2 LeaveCriticalSection LeaveCriticalSection _fseek 94847->94857 94849 7837e0 _memset 94956 787c0e 47 API calls __getptd_noexit 94849->94956 94852->94847 94852->94849 94858 782933 94852->94858 94865 78ee0e 94852->94865 94933 78eb66 94852->94933 94955 78ec87 47 API calls 3 library calls 94852->94955 94855->94837 94856->94829 94857->94829 94859 78293d 94858->94859 94860 782952 94858->94860 94861 787c0e _fprintf 47 API calls 94859->94861 94860->94852 94862 782942 94861->94862 94863 786e10 _fprintf 8 API calls 94862->94863 94864 78294d 94863->94864 94864->94852 94866 78ee2f 94865->94866 94867 78ee46 94865->94867 94868 787bda __dosmaperr 47 API calls 94866->94868 94869 78f57e 94867->94869 94874 78ee80 94867->94874 94871 78ee34 94868->94871 94870 787bda __dosmaperr 47 API calls 94869->94870 94872 78f583 94870->94872 94873 787c0e _fprintf 47 API calls 94871->94873 94875 787c0e _fprintf 47 API calls 94872->94875 94913 78ee3b 94873->94913 94876 78ee88 94874->94876 94881 78ee9f 94874->94881 94878 78ee94 94875->94878 94877 787bda __dosmaperr 47 API calls 94876->94877 94879 78ee8d 94877->94879 94880 786e10 _fprintf 8 API calls 94878->94880 94883 787c0e _fprintf 47 API calls 94879->94883 94880->94913 94882 78eeb4 94881->94882 94885 78eece 94881->94885 94886 78eeec 94881->94886 94881->94913 94884 787bda __dosmaperr 47 API calls 94882->94884 94883->94878 94884->94879 94885->94882 94888 78eed9 94885->94888 94887 7869d0 __malloc_crt 47 API calls 94886->94887 94889 78eefc 94887->94889 94890 793bf2 __flswbuf 47 API calls 94888->94890 94891 78ef1f 94889->94891 94892 78ef04 94889->94892 94893 78efed 94890->94893 94896 78f82f __lseeki64_nolock 49 API calls 94891->94896 94894 787c0e _fprintf 47 API calls 94892->94894 94895 78f066 ReadFile 94893->94895 94900 78f003 GetConsoleMode 94893->94900 94897 78ef09 94894->94897 94898 78f088 94895->94898 94899 78f546 GetLastError 94895->94899 94896->94888 94901 787bda __dosmaperr 47 API calls 94897->94901 94898->94899 94906 78f058 94898->94906 94902 78f046 94899->94902 94903 78f553 94899->94903 94904 78f063 94900->94904 94905 78f017 94900->94905 94901->94913 94909 787bed __dosmaperr 47 API calls 94902->94909 94919 78f04c 94902->94919 94907 787c0e _fprintf 47 API calls 94903->94907 94904->94895 94905->94904 94908 78f01d ReadConsoleW 94905->94908 94915 78f0bd 94906->94915 94916 78f32a 94906->94916 94906->94919 94910 78f558 94907->94910 94908->94906 94911 78f040 GetLastError 94908->94911 94909->94919 94912 787bda __dosmaperr 47 API calls 94910->94912 94911->94902 94912->94919 94913->94852 94914 781c9d _free 47 API calls 94914->94913 94918 78f129 ReadFile 94915->94918 94924 78f1aa 94915->94924 94916->94919 94922 78f430 ReadFile 94916->94922 94920 78f14a GetLastError 94918->94920 94928 78f154 94918->94928 94919->94913 94919->94914 94920->94928 94921 78f257 94925 787c0e _fprintf 47 API calls 94921->94925 94923 78f453 GetLastError 94922->94923 94932 78f461 94922->94932 94923->94932 94924->94919 94924->94921 94926 78f267 94924->94926 94927 78f217 MultiByteToWideChar 94924->94927 94925->94919 94926->94927 94929 78f82f __lseeki64_nolock 49 API calls 94926->94929 94927->94911 94927->94919 94928->94915 94930 78f82f __lseeki64_nolock 49 API calls 94928->94930 94929->94927 94930->94928 94931 78f82f __lseeki64_nolock 49 API calls 94931->94932 94932->94916 94932->94931 94934 78eb71 94933->94934 94938 78eb86 94933->94938 94935 787c0e _fprintf 47 API calls 94934->94935 94936 78eb76 94935->94936 94937 786e10 _fprintf 8 API calls 94936->94937 94945 78eb81 94937->94945 94939 78ebbb 94938->94939 94940 793e24 __getbuf 47 API calls 94938->94940 94938->94945 94941 782933 _fprintf 47 API calls 94939->94941 94940->94939 94942 78ebcf 94941->94942 94943 78ed06 __filbuf 62 API calls 94942->94943 94944 78ebd6 94943->94944 94944->94945 94946 782933 _fprintf 47 API calls 94944->94946 94945->94852 94947 78ebf9 94946->94947 94947->94945 94948 782933 _fprintf 47 API calls 94947->94948 94949 78ec05 94948->94949 94949->94945 94950 782933 _fprintf 47 API calls 94949->94950 94951 78ec12 94950->94951 94952 782933 _fprintf 47 API calls 94951->94952 94952->94945 94953->94845 94954->94847 94955->94852 94956->94845 94960 78344a GetSystemTimeAsFileTime 94957->94960 94959 7abdc3 94959->94690 94961 783478 __aulldiv 94960->94961 94961->94959 94963 783e71 __tzset_nolock 94962->94963 94964 783e7f 94963->94964 94965 783e94 94963->94965 94976 787c0e 47 API calls __getptd_noexit 94964->94976 94967 784e1c __lock_file 48 API calls 94965->94967 94969 783e9a 94967->94969 94968 783e84 94977 786e10 8 API calls _fprintf 94968->94977 94978 783b0c 55 API calls 5 library calls 94969->94978 94972 783ea5 94979 783ec5 LeaveCriticalSection LeaveCriticalSection _fseek 94972->94979 94973 783e8f __tzset_nolock 94973->94695 94975 783eb7 94975->94973 94976->94968 94977->94973 94978->94972 94979->94975 94981 7ac581 __tzset_nolock _wcscmp 94980->94981 94982 7644ed 64 API calls 94981->94982 94983 7ac417 94981->94983 94984 7abf5a GetSystemTimeAsFileTime 94981->94984 94985 764517 83 API calls 94981->94985 94982->94981 94983->94611 94983->94637 94984->94981 94985->94981 94987 7ab97e 94986->94987 94988 7ab970 94986->94988 94990 7ab9c3 94987->94990 94991 783499 117 API calls 94987->94991 95009 7ab987 94987->95009 94989 783499 117 API calls 94988->94989 94989->94987 95017 7abbe8 94990->95017 94993 7ab9a8 94991->94993 94993->94990 94995 7ab9b1 94993->94995 94994 7aba07 94996 7aba0b 94994->94996 94997 7aba2c 94994->94997 94999 7835e4 __fcloseall 83 API calls 94995->94999 94995->95009 94998 7aba18 94996->94998 95002 7835e4 __fcloseall 83 API calls 94996->95002 95021 7ab7e5 94997->95021 95005 7835e4 __fcloseall 83 API calls 94998->95005 94998->95009 94999->95009 95002->94998 95003 7aba5a 95030 7aba8a 95003->95030 95004 7aba3a 95006 7aba47 95004->95006 95008 7835e4 __fcloseall 83 API calls 95004->95008 95005->95009 95006->95009 95011 7835e4 __fcloseall 83 API calls 95006->95011 95008->95006 95009->94640 95011->95009 95014 7aba75 95014->95009 95016 7835e4 __fcloseall 83 API calls 95014->95016 95016->95009 95018 7abc0d 95017->95018 95020 7abbf6 __tzset_nolock ___crtGetEnvironmentStringsW 95017->95020 95019 78381e __fread_nolock 64 API calls 95018->95019 95019->95020 95020->94994 95022 78395c __malloc_crt 47 API calls 95021->95022 95023 7ab7f4 95022->95023 95024 78395c __malloc_crt 47 API calls 95023->95024 95025 7ab808 95024->95025 95026 78395c __malloc_crt 47 API calls 95025->95026 95027 7ab81c 95026->95027 95028 7abb64 47 API calls 95027->95028 95029 7ab82f 95027->95029 95028->95029 95029->95003 95029->95004 95036 7abaa0 95030->95036 95031 7abb51 95063 7abd8a 95031->95063 95032 7ab841 64 API calls 95032->95036 95034 7aba61 95038 7abb64 95034->95038 95036->95031 95036->95032 95036->95034 95059 7abc67 95036->95059 95067 7ab942 64 API calls 95036->95067 95039 7abb77 95038->95039 95040 7abb71 95038->95040 95042 781c9d _free 47 API calls 95039->95042 95043 7abb88 95039->95043 95041 781c9d _free 47 API calls 95040->95041 95041->95039 95042->95043 95044 781c9d _free 47 API calls 95043->95044 95045 7aba68 95043->95045 95044->95045 95045->95014 95046 7835e4 95045->95046 95047 7835f0 __tzset_nolock 95046->95047 95048 78361c 95047->95048 95049 783604 95047->95049 95051 784e1c __lock_file 48 API calls 95048->95051 95055 783614 __tzset_nolock 95048->95055 95101 787c0e 47 API calls __getptd_noexit 95049->95101 95053 78362e 95051->95053 95052 783609 95102 786e10 8 API calls _fprintf 95052->95102 95085 783578 95053->95085 95055->95014 95061 7abc76 95059->95061 95062 7abcb6 95059->95062 95061->95036 95061->95061 95062->95061 95068 7abd3d 95062->95068 95064 7abda8 95063->95064 95065 7abd97 95063->95065 95064->95034 95066 782aae 80 API calls 95065->95066 95066->95064 95067->95036 95069 7abd69 95068->95069 95070 7abd7a 95068->95070 95072 782aae 95069->95072 95070->95062 95073 782aba __tzset_nolock 95072->95073 95074 782aec 95073->95074 95075 782ad4 95073->95075 95076 782ae4 __tzset_nolock 95073->95076 95077 784e1c __lock_file 48 API calls 95074->95077 95078 787c0e _fprintf 47 API calls 95075->95078 95076->95070 95079 782af2 95077->95079 95080 782ad9 95078->95080 95081 782957 78 API calls 95079->95081 95082 786e10 _fprintf 8 API calls 95080->95082 95083 782b06 95081->95083 95082->95076 95084 782b24 LeaveCriticalSection LeaveCriticalSection 95083->95084 95084->95076 95086 78359b 95085->95086 95087 783587 95085->95087 95089 783597 95086->95089 95104 782c84 95086->95104 95137 787c0e 47 API calls __getptd_noexit 95087->95137 95103 783653 LeaveCriticalSection LeaveCriticalSection _fseek 95089->95103 95090 78358c 95138 786e10 8 API calls _fprintf 95090->95138 95096 782933 _fprintf 47 API calls 95097 7835b5 95096->95097 95114 78e9d2 95097->95114 95099 7835bb 95099->95089 95100 781c9d _free 47 API calls 95099->95100 95100->95089 95101->95052 95102->95055 95103->95055 95105 782cbb 95104->95105 95106 782c97 95104->95106 95110 78eb36 95105->95110 95106->95105 95107 782933 _fprintf 47 API calls 95106->95107 95108 782cb4 95107->95108 95139 78af61 95108->95139 95111 7835af 95110->95111 95112 78eb43 95110->95112 95111->95096 95112->95111 95113 781c9d _free 47 API calls 95112->95113 95113->95111 95115 78e9de __tzset_nolock 95114->95115 95116 78e9fe 95115->95116 95117 78e9e6 95115->95117 95118 78ea7b 95116->95118 95124 78ea28 95116->95124 95188 787bda 47 API calls __getptd_noexit 95117->95188 95192 787bda 47 API calls __getptd_noexit 95118->95192 95120 78e9eb 95189 787c0e 47 API calls __getptd_noexit 95120->95189 95123 78ea80 95193 787c0e 47 API calls __getptd_noexit 95123->95193 95164 78a8ed 95124->95164 95127 78ea88 95194 786e10 8 API calls _fprintf 95127->95194 95128 78ea2e 95130 78ea4c 95128->95130 95131 78ea41 95128->95131 95190 787c0e 47 API calls __getptd_noexit 95130->95190 95173 78ea9c 95131->95173 95132 78e9f3 __tzset_nolock 95132->95099 95135 78ea47 95191 78ea73 LeaveCriticalSection __unlock_fhandle 95135->95191 95137->95090 95138->95089 95140 78af6d __tzset_nolock 95139->95140 95141 78af8d 95140->95141 95142 78af75 95140->95142 95144 78b022 95141->95144 95148 78afbf 95141->95148 95143 787bda __dosmaperr 47 API calls 95142->95143 95146 78af7a 95143->95146 95145 787bda __dosmaperr 47 API calls 95144->95145 95147 78b027 95145->95147 95149 787c0e _fprintf 47 API calls 95146->95149 95150 787c0e _fprintf 47 API calls 95147->95150 95151 78a8ed ___lock_fhandle 49 API calls 95148->95151 95152 78af82 __tzset_nolock 95149->95152 95153 78b02f 95150->95153 95154 78afc5 95151->95154 95152->95105 95155 786e10 _fprintf 8 API calls 95153->95155 95156 78afd8 95154->95156 95157 78afeb 95154->95157 95155->95152 95158 78b043 __chsize_nolock 75 API calls 95156->95158 95159 787c0e _fprintf 47 API calls 95157->95159 95161 78afe4 95158->95161 95160 78aff0 95159->95160 95162 787bda __dosmaperr 47 API calls 95160->95162 95163 78b01a __flush LeaveCriticalSection 95161->95163 95162->95161 95163->95152 95165 78a8f9 __tzset_nolock 95164->95165 95166 78a946 EnterCriticalSection 95165->95166 95168 787cf4 __lock 47 API calls 95165->95168 95167 78a96c __tzset_nolock 95166->95167 95167->95128 95169 78a91d 95168->95169 95170 78a928 InitializeCriticalSectionAndSpinCount 95169->95170 95171 78a93a 95169->95171 95170->95171 95172 78a970 ___lock_fhandle LeaveCriticalSection 95171->95172 95172->95166 95174 78aba4 __chsize_nolock 47 API calls 95173->95174 95176 78eaaa 95174->95176 95175 78eb00 95178 78ab1e __free_osfhnd 48 API calls 95175->95178 95176->95175 95177 78eade 95176->95177 95180 78aba4 __chsize_nolock 47 API calls 95176->95180 95177->95175 95181 78aba4 __chsize_nolock 47 API calls 95177->95181 95179 78eb08 95178->95179 95182 78eb2a 95179->95182 95185 787bed __dosmaperr 47 API calls 95179->95185 95183 78ead5 95180->95183 95184 78eaea CloseHandle 95181->95184 95182->95135 95186 78aba4 __chsize_nolock 47 API calls 95183->95186 95184->95175 95187 78eaf6 GetLastError 95184->95187 95185->95182 95186->95177 95187->95175 95188->95120 95189->95132 95190->95135 95191->95132 95192->95123 95193->95127 95194->95132 95195->94523 95196->94534 95197->94534 95198->94528 95199->94547 95200->94549 95201->94546 95202->94554 95203->94560 95204->94573 95205->94568 95207 78f8a0 __ftell_nolock 95206->95207 95208 7640b4 GetLongPathNameW 95207->95208 95209 766a63 48 API calls 95208->95209 95210 7640dc 95209->95210 95211 7649a0 95210->95211 95212 76d7f7 48 API calls 95211->95212 95213 7649b2 95212->95213 95214 76660f 49 API calls 95213->95214 95215 7649bd 95214->95215 95216 7649c8 95215->95216 95220 7d2e35 95215->95220 95217 7664cf 48 API calls 95216->95217 95219 7649d4 95217->95219 95258 7628a6 95219->95258 95222 7d2e4f 95220->95222 95264 77d35e 60 API calls 95220->95264 95223 7649e7 Mailbox 95223->94397 95225 7641a9 136 API calls 95224->95225 95226 76415e 95225->95226 95227 7d3489 95226->95227 95228 7641a9 136 API calls 95226->95228 95229 7ac396 122 API calls 95227->95229 95231 764172 95228->95231 95230 7d349e 95229->95230 95232 7d34bf 95230->95232 95233 7d34a2 95230->95233 95231->95227 95234 76417a 95231->95234 95236 77f4ea 48 API calls 95232->95236 95235 764252 84 API calls 95233->95235 95237 764186 95234->95237 95238 7d34aa 95234->95238 95235->95238 95257 7d3504 Mailbox 95236->95257 95265 76c833 95237->95265 95367 7a6b49 87 API calls _wprintf 95238->95367 95241 7d34b8 95241->95232 95243 7d36b4 95244 781c9d _free 47 API calls 95243->95244 95245 7d36bc 95244->95245 95246 764252 84 API calls 95245->95246 95251 7d36c5 95246->95251 95250 781c9d _free 47 API calls 95250->95251 95251->95250 95253 764252 84 API calls 95251->95253 95371 7a25b5 86 API calls 4 library calls 95251->95371 95253->95251 95254 76ce19 48 API calls 95254->95257 95257->95243 95257->95251 95257->95254 95353 76ba85 95257->95353 95361 764dd9 95257->95361 95368 7a2551 48 API calls ___crtGetEnvironmentStringsW 95257->95368 95369 7a2472 60 API calls 2 library calls 95257->95369 95370 7a9c12 48 API calls 95257->95370 95259 7628b8 95258->95259 95263 7628d7 ___crtGetEnvironmentStringsW 95258->95263 95261 77f4ea 48 API calls 95259->95261 95260 77f4ea 48 API calls 95262 7628ee 95260->95262 95261->95263 95262->95223 95263->95260 95264->95220 95266 76c843 __ftell_nolock 95265->95266 95267 76c860 95266->95267 95268 7d3095 95266->95268 95377 7648ba 49 API calls 95267->95377 95396 7a25b5 86 API calls 4 library calls 95268->95396 95271 7d30a8 95397 7a25b5 86 API calls 4 library calls 95271->95397 95272 76c882 95378 764550 56 API calls 95272->95378 95274 76c897 95274->95271 95275 76c89f 95274->95275 95277 76d7f7 48 API calls 95275->95277 95279 76c8ab 95277->95279 95278 7d30c4 95281 76c90c 95278->95281 95379 77e968 49 API calls __ftell_nolock 95279->95379 95282 7d30d7 95281->95282 95283 76c91a 95281->95283 95285 764907 CloseHandle 95282->95285 95382 781dfc 95283->95382 95284 76c8b7 95286 76d7f7 48 API calls 95284->95286 95288 7d30e3 95285->95288 95289 76c8c3 95286->95289 95290 7641a9 136 API calls 95288->95290 95291 76660f 49 API calls 95289->95291 95292 7d310d 95290->95292 95293 76c8d1 95291->95293 95295 7d3136 95292->95295 95298 7ac396 122 API calls 95292->95298 95380 77eb66 SetFilePointerEx ReadFile 95293->95380 95294 76c943 _wcscat _wcscpy 95297 76c96d SetCurrentDirectoryW 95294->95297 95398 7a25b5 86 API calls 4 library calls 95295->95398 95301 77f4ea 48 API calls 95297->95301 95302 7d3129 95298->95302 95299 76c8fd 95381 7646ce SetFilePointerEx SetFilePointerEx 95299->95381 95305 76c988 95301->95305 95306 7d3131 95302->95306 95307 7d3152 95302->95307 95304 7d314d 95313 76cad1 Mailbox 95304->95313 95308 7647b7 48 API calls 95305->95308 95309 764252 84 API calls 95306->95309 95310 764252 84 API calls 95307->95310 95325 76c993 Mailbox __NMSG_WRITE 95308->95325 95309->95295 95311 7d3157 95310->95311 95312 77f4ea 48 API calls 95311->95312 95320 7d3194 95312->95320 95372 7648dd 95313->95372 95314 76ca9d 95392 764907 95314->95392 95318 763d98 95318->94263 95318->94272 95319 76caa9 SetCurrentDirectoryW 95319->95313 95322 76ba85 48 API calls 95320->95322 95350 7d31dd Mailbox 95322->95350 95324 7d33ce 95403 7a9b72 48 API calls 95324->95403 95325->95314 95334 7d345f 95325->95334 95336 76ce19 48 API calls 95325->95336 95338 7d3467 95325->95338 95385 76b337 56 API calls _wcscpy 95325->95385 95386 77c258 GetStringTypeW 95325->95386 95387 76cb93 59 API calls __wcsnicmp 95325->95387 95388 76cb5a GetStringTypeW __NMSG_WRITE 95325->95388 95389 7816d0 GetStringTypeW __wtof_l 95325->95389 95390 76cc24 162 API calls 3 library calls 95325->95390 95391 77c682 48 API calls 95325->95391 95328 7d3480 95328->95314 95330 7d33f0 95404 7c29e8 48 API calls ___crtGetEnvironmentStringsW 95330->95404 95332 7d33fd 95335 781c9d _free 47 API calls 95332->95335 95406 7a240b 48 API calls 3 library calls 95334->95406 95335->95313 95336->95325 95407 7a25b5 86 API calls 4 library calls 95338->95407 95339 76ba85 48 API calls 95339->95350 95344 76ce19 48 API calls 95344->95350 95347 7d3420 95405 7a25b5 86 API calls 4 library calls 95347->95405 95349 7d3439 95351 781c9d _free 47 API calls 95349->95351 95350->95324 95350->95339 95350->95344 95350->95347 95399 7a2551 48 API calls ___crtGetEnvironmentStringsW 95350->95399 95400 7a2472 60 API calls 2 library calls 95350->95400 95401 7a9c12 48 API calls 95350->95401 95402 77c682 48 API calls 95350->95402 95352 7d344c 95351->95352 95352->95313 95354 76bb25 95353->95354 95359 76ba98 ___crtGetEnvironmentStringsW 95353->95359 95356 77f4ea 48 API calls 95354->95356 95355 77f4ea 48 API calls 95358 76ba9f 95355->95358 95356->95359 95357 76bac8 95357->95257 95358->95357 95360 77f4ea 48 API calls 95358->95360 95359->95355 95360->95357 95362 764dec 95361->95362 95365 764e9a 95361->95365 95363 77f4ea 48 API calls 95362->95363 95366 764e1e 95362->95366 95363->95366 95364 77f4ea 48 API calls 95364->95366 95365->95257 95366->95364 95366->95365 95367->95241 95368->95257 95369->95257 95370->95257 95371->95251 95373 764907 CloseHandle 95372->95373 95374 7648e5 Mailbox 95373->95374 95375 764907 CloseHandle 95374->95375 95376 7648fc 95375->95376 95376->95318 95377->95272 95378->95274 95379->95284 95380->95299 95381->95281 95408 781e46 95382->95408 95385->95325 95386->95325 95387->95325 95388->95325 95389->95325 95390->95325 95391->95325 95393 764920 95392->95393 95394 764911 95392->95394 95393->95394 95395 764925 CloseHandle 95393->95395 95394->95319 95395->95394 95396->95271 95397->95278 95398->95304 95399->95350 95400->95350 95401->95350 95402->95350 95403->95330 95404->95332 95405->95349 95406->95338 95407->95328 95409 781e61 95408->95409 95412 781e55 95408->95412 95432 787c0e 47 API calls __getptd_noexit 95409->95432 95411 782019 95414 781e41 95411->95414 95433 786e10 8 API calls _fprintf 95411->95433 95412->95409 95423 781ed4 95412->95423 95427 789d6b 47 API calls _fprintf 95412->95427 95414->95294 95415 781f41 95417 781fa0 95415->95417 95418 781f5f 95415->95418 95417->95409 95417->95414 95419 781fb0 95417->95419 95418->95409 95424 781f7b 95418->95424 95429 789d6b 47 API calls _fprintf 95418->95429 95431 789d6b 47 API calls _fprintf 95419->95431 95422 781f91 95430 789d6b 47 API calls _fprintf 95422->95430 95423->95409 95423->95415 95428 789d6b 47 API calls _fprintf 95423->95428 95424->95409 95424->95414 95424->95422 95427->95423 95428->95415 95429->95424 95430->95414 95431->95414 95432->95411 95433->95414 95435 764c8b 95434->95435 95439 764d94 95434->95439 95436 77f4ea 48 API calls 95435->95436 95435->95439 95437 764cb2 95436->95437 95438 77f4ea 48 API calls 95437->95438 95444 764d22 95438->95444 95439->94403 95441 764dd9 48 API calls 95441->95444 95443 76ba85 48 API calls 95443->95444 95444->95439 95444->95441 95444->95443 95447 76b470 91 API calls 2 library calls 95444->95447 95448 7a9af1 48 API calls 95444->95448 95445->94405 95446->94407 95447->95444 95448->95444 95450 7d418d EnumResourceNamesW 95449->95450 95451 76403c LoadImageW 95449->95451 95452 763ee1 RegisterClassExW 95450->95452 95451->95452 95453 763f53 7 API calls 95452->95453 95453->94422 95455 76f130 95454->95455 95462 76f199 95455->95462 95564 76fe30 346 API calls __cinit 95455->95564 95456 76f3dd 95459 7d87c8 95456->95459 95471 76f3f2 95456->95471 95504 76f431 Mailbox 95456->95504 95457 76f595 95465 76d7f7 48 API calls 95457->95465 95457->95504 95568 7acc5c 86 API calls 4 library calls 95459->95568 95460 7d8728 95460->95462 95565 7acc5c 86 API calls 4 library calls 95460->95565 95462->95456 95462->95457 95466 76d7f7 48 API calls 95462->95466 95498 76f229 95462->95498 95463 76fe30 346 API calls 95463->95504 95467 7d87a3 95465->95467 95469 7d8772 95466->95469 95567 780f0a 52 API calls __cinit 95467->95567 95468 7d8b1b 95486 7d8b2c 95468->95486 95487 7d8bcf 95468->95487 95566 780f0a 52 API calls __cinit 95469->95566 95496 76f418 95471->95496 95569 7a9af1 48 API calls 95471->95569 95472 76f770 95480 7d8a45 95472->95480 95497 76f77a 95472->95497 95474 76d6e9 55 API calls 95474->95504 95476 7d8c53 95584 7acc5c 86 API calls 4 library calls 95476->95584 95477 7d8810 95570 7beef8 346 API calls 95477->95570 95479 7acc5c 86 API calls 95479->95504 95576 77c1af 48 API calls 95480->95576 95481 7d8b7e 95579 7be40a 346 API calls Mailbox 95481->95579 95578 7bf5ee 346 API calls 95486->95578 95581 7acc5c 86 API calls 4 library calls 95487->95581 95488 7d8beb 95582 7bbdbd 346 API calls Mailbox 95488->95582 95492 771b90 48 API calls 95492->95504 95494 771b90 48 API calls 95494->95504 95495 7d8c00 95518 76f537 Mailbox 95495->95518 95583 7acc5c 86 API calls 4 library calls 95495->95583 95496->95468 95499 76f6aa 95496->95499 95496->95504 95497->95494 95498->95456 95498->95457 95498->95496 95498->95504 95499->95472 95502 76fce0 95499->95502 95499->95504 95499->95518 95562 76fe30 346 API calls __cinit 95499->95562 95501 7d8823 95501->95496 95503 7d884b 95501->95503 95502->95518 95580 7acc5c 86 API calls 4 library calls 95502->95580 95571 7bccdc 48 API calls 95503->95571 95504->95463 95504->95474 95504->95476 95504->95479 95504->95481 95504->95488 95504->95492 95504->95502 95504->95518 95563 76dd47 48 API calls ___crtGetEnvironmentStringsW 95504->95563 95577 7997ed InterlockedDecrement 95504->95577 95585 77c1af 48 API calls 95504->95585 95508 7d8857 95510 7d8865 95508->95510 95511 7d88aa 95508->95511 95572 7a9b72 48 API calls 95510->95572 95514 7d88a0 Mailbox 95511->95514 95573 7aa69d 48 API calls 95511->95573 95575 76fe30 346 API calls __cinit 95514->95575 95516 7d88e7 95574 76bc74 48 API calls 95516->95574 95518->94484 95520 774637 95519->95520 95521 77479f 95519->95521 95523 774643 95520->95523 95524 7d6e05 95520->95524 95522 76ce19 48 API calls 95521->95522 95531 7746e4 Mailbox 95522->95531 95636 774300 346 API calls ___crtGetEnvironmentStringsW 95523->95636 95637 7be822 346 API calls Mailbox 95524->95637 95527 774659 95528 774739 Mailbox 95527->95528 95529 7d6e11 95527->95529 95527->95531 95528->94484 95529->95528 95638 7acc5c 86 API calls 4 library calls 95529->95638 95533 764252 84 API calls 95531->95533 95586 7a6524 95531->95586 95589 7afa0c 95531->95589 95630 7c0d09 95531->95630 95633 7c0d1d 95531->95633 95533->95528 95539 7ddf42 95537->95539 95541 77e253 95537->95541 95538 7ddf77 95539->95538 95540 7ddf59 TranslateAcceleratorW 95539->95540 95540->95541 95541->94484 95543 77dca3 95542->95543 95546 77dc71 95542->95546 95543->94484 95544 77dc96 IsDialogMessageW 95544->95543 95544->95546 95545 7ddd1d GetClassLongW 95545->95544 95545->95546 95546->95543 95546->95544 95546->95545 95547->94484 95548->94484 95549->94484 95550->94429 95551->94432 95552->94437 95553->94484 95554->94484 95555->94480 95556->94480 95557->94480 95558->94484 95559->94480 95560->94480 95561->94480 95562->95499 95563->95504 95564->95460 95565->95462 95566->95498 95567->95504 95568->95518 95569->95477 95570->95501 95571->95508 95572->95514 95573->95516 95574->95514 95575->95518 95576->95504 95577->95504 95578->95504 95579->95502 95580->95518 95581->95518 95582->95495 95583->95518 95584->95518 95585->95504 95639 7a6ca9 GetFileAttributesW 95586->95639 95590 7afa1c __ftell_nolock 95589->95590 95591 7afa44 95590->95591 95704 76d286 48 API calls 95590->95704 95593 76936c 81 API calls 95591->95593 95594 7afa5e 95593->95594 95595 7afb68 95594->95595 95596 7afa80 95594->95596 95605 7afb92 95594->95605 95597 7641a9 136 API calls 95595->95597 95598 76936c 81 API calls 95596->95598 95599 7afb79 95597->95599 95603 7afa8c _wcscpy _wcschr 95598->95603 95600 7afb8e 95599->95600 95601 7641a9 136 API calls 95599->95601 95602 76936c 81 API calls 95600->95602 95600->95605 95601->95600 95604 7afbc7 95602->95604 95609 7afab0 _wcscat _wcscpy 95603->95609 95613 7afade _wcscat 95603->95613 95606 781dfc __wsplitpath 47 API calls 95604->95606 95605->95528 95614 7afbeb _wcscat _wcscpy 95606->95614 95607 76936c 81 API calls 95608 7afafc _wcscpy 95607->95608 95705 7a72cb GetFileAttributesW 95608->95705 95611 76936c 81 API calls 95609->95611 95611->95613 95612 7afb1c __NMSG_WRITE 95612->95605 95615 76936c 81 API calls 95612->95615 95613->95607 95617 76936c 81 API calls 95614->95617 95616 7afb48 95615->95616 95706 7a60dd 77 API calls 4 library calls 95616->95706 95619 7afc82 95617->95619 95643 7a690b 95619->95643 95620 7afb5c 95620->95605 95622 7afca2 95623 7a6524 3 API calls 95622->95623 95624 7afcb1 95623->95624 95625 76936c 81 API calls 95624->95625 95627 7afce2 95624->95627 95626 7afccb 95625->95626 95649 7abfa4 95626->95649 95629 764252 84 API calls 95627->95629 95629->95605 95711 7bf8ae 95630->95711 95632 7c0d19 95632->95528 95634 7bf8ae 129 API calls 95633->95634 95635 7c0d2d 95634->95635 95635->95528 95636->95527 95637->95529 95638->95528 95640 7a6529 95639->95640 95641 7a6cc4 FindFirstFileW 95639->95641 95640->95528 95641->95640 95642 7a6cd9 FindClose 95641->95642 95642->95640 95644 7a6918 _wcschr __ftell_nolock 95643->95644 95645 781dfc __wsplitpath 47 API calls 95644->95645 95648 7a692e _wcscat _wcscpy 95644->95648 95646 7a695d 95645->95646 95647 781dfc __wsplitpath 47 API calls 95646->95647 95647->95648 95648->95622 95650 7abfb1 __ftell_nolock 95649->95650 95651 77f4ea 48 API calls 95650->95651 95652 7ac00e 95651->95652 95653 7647b7 48 API calls 95652->95653 95654 7ac018 95653->95654 95655 7abdb4 GetSystemTimeAsFileTime 95654->95655 95656 7ac023 95655->95656 95657 764517 83 API calls 95656->95657 95658 7ac036 _wcscmp 95657->95658 95659 7ac05a 95658->95659 95660 7ac107 95658->95660 95661 7ac56d 94 API calls 95659->95661 95662 7ac56d 94 API calls 95660->95662 95663 7ac05f 95661->95663 95664 7ac0d3 _wcscat 95662->95664 95665 781dfc __wsplitpath 47 API calls 95663->95665 95668 7ac110 95663->95668 95667 7644ed 64 API calls 95664->95667 95664->95668 95666 7ac088 _wcscat _wcscpy 95665->95666 95673 781dfc __wsplitpath 47 API calls 95666->95673 95669 7ac12c 95667->95669 95668->95627 95670 7644ed 64 API calls 95669->95670 95671 7ac13c 95670->95671 95672 7644ed 64 API calls 95671->95672 95674 7ac157 95672->95674 95673->95664 95675 7644ed 64 API calls 95674->95675 95676 7ac167 95675->95676 95677 7644ed 64 API calls 95676->95677 95678 7ac182 95677->95678 95679 7644ed 64 API calls 95678->95679 95680 7ac192 95679->95680 95681 7644ed 64 API calls 95680->95681 95682 7ac1a2 95681->95682 95683 7644ed 64 API calls 95682->95683 95684 7ac1b2 95683->95684 95707 7ac71a GetTempPathW GetTempFileNameW 95684->95707 95686 7ac1be 95687 783499 117 API calls 95686->95687 95697 7ac1cf 95687->95697 95688 7ac289 95689 7835e4 __fcloseall 83 API calls 95688->95689 95690 7ac294 95689->95690 95692 7ac29a DeleteFileW 95690->95692 95693 7ac2ae 95690->95693 95691 7644ed 64 API calls 95691->95697 95692->95668 95694 7ac342 CopyFileW 95693->95694 95699 7ac2b8 95693->95699 95695 7ac36a DeleteFileW 95694->95695 95696 7ac358 DeleteFileW 95694->95696 95708 7ac6d9 CreateFileW 95695->95708 95696->95668 95697->95668 95697->95688 95697->95691 95700 782aae 80 API calls 95697->95700 95701 7ab965 118 API calls 95699->95701 95700->95697 95702 7ac32d 95701->95702 95702->95695 95703 7ac331 DeleteFileW 95702->95703 95703->95668 95704->95591 95705->95612 95706->95620 95707->95686 95709 7ac6ff SetFileTime CloseHandle 95708->95709 95710 7ac715 95708->95710 95709->95710 95710->95668 95712 76936c 81 API calls 95711->95712 95713 7bf8ea 95712->95713 95735 7bf92c Mailbox 95713->95735 95747 7c0567 95713->95747 95715 7bfb8b 95716 7bfcfa 95715->95716 95720 7bfb95 95715->95720 95783 7c0688 89 API calls Mailbox 95716->95783 95719 7bfd07 95719->95720 95722 7bfd13 95719->95722 95760 7bf70a 95720->95760 95721 76936c 81 API calls 95738 7bf984 Mailbox 95721->95738 95722->95735 95727 7bfbc9 95774 77ed18 95727->95774 95730 7bfbfd 95733 77c050 48 API calls 95730->95733 95731 7bfbe3 95780 7acc5c 86 API calls 4 library calls 95731->95780 95736 7bfc14 95733->95736 95734 7bfbee GetCurrentProcess TerminateProcess 95734->95730 95735->95632 95737 7bfc3e 95736->95737 95739 771b90 48 API calls 95736->95739 95740 7bfd65 95737->95740 95743 771b90 48 API calls 95737->95743 95782 76dcae 50 API calls Mailbox 95737->95782 95784 7c040f 105 API calls _free 95737->95784 95738->95715 95738->95721 95738->95735 95778 7c29e8 48 API calls ___crtGetEnvironmentStringsW 95738->95778 95779 7bfda5 60 API calls 2 library calls 95738->95779 95741 7bfc2d 95739->95741 95740->95735 95744 7bfd7e FreeLibrary 95740->95744 95781 7c040f 105 API calls _free 95741->95781 95743->95737 95744->95735 95748 76bdfa 48 API calls 95747->95748 95749 7c0582 CharLowerBuffW 95748->95749 95785 7a1f11 95749->95785 95753 76d7f7 48 API calls 95754 7c05bb 95753->95754 95792 7669e9 48 API calls ___crtGetEnvironmentStringsW 95754->95792 95756 7c05d2 95758 76b18b 48 API calls 95756->95758 95757 7c061a Mailbox 95757->95738 95759 7c05de Mailbox 95758->95759 95759->95757 95793 7bfda5 60 API calls 2 library calls 95759->95793 95761 7bf725 95760->95761 95765 7bf77a 95760->95765 95762 77f4ea 48 API calls 95761->95762 95764 7bf747 95762->95764 95763 77f4ea 48 API calls 95763->95764 95764->95763 95764->95765 95766 7c0828 95765->95766 95767 7c0a53 Mailbox 95766->95767 95770 7c084b _strcat _wcscpy __NMSG_WRITE 95766->95770 95767->95727 95768 76cf93 58 API calls 95768->95770 95769 76d286 48 API calls 95769->95770 95770->95767 95770->95768 95770->95769 95771 76936c 81 API calls 95770->95771 95772 78395c 47 API calls __malloc_crt 95770->95772 95796 7a8035 50 API calls __NMSG_WRITE 95770->95796 95771->95770 95772->95770 95776 77ed2d 95774->95776 95775 77edc5 VirtualProtect 95777 77ed93 95775->95777 95776->95775 95776->95777 95777->95730 95777->95731 95778->95738 95779->95738 95780->95734 95781->95737 95782->95737 95783->95719 95784->95737 95787 7a1f3b __NMSG_WRITE 95785->95787 95786 7a1f79 95786->95753 95786->95759 95787->95786 95788 7a1f6f 95787->95788 95789 7a1ffa 95787->95789 95788->95786 95794 77d37a 60 API calls 95788->95794 95789->95786 95795 77d37a 60 API calls 95789->95795 95792->95756 95793->95757 95794->95788 95795->95789 95796->95770 95797 7d197b 95802 77dd94 95797->95802 95801 7d198a 95803 77f4ea 48 API calls 95802->95803 95804 77dd9c 95803->95804 95805 77ddb0 95804->95805 95810 77df3d 95804->95810 95809 780f0a 52 API calls __cinit 95805->95809 95809->95801 95811 77df46 95810->95811 95812 77dda8 95810->95812 95842 780f0a 52 API calls __cinit 95811->95842 95814 77ddc0 95812->95814 95815 76d7f7 48 API calls 95814->95815 95816 77ddd7 GetVersionExW 95815->95816 95817 766a63 48 API calls 95816->95817 95818 77de1a 95817->95818 95843 77dfb4 95818->95843 95821 766571 48 API calls 95829 77de2e 95821->95829 95823 7d24c8 95825 77debb 95827 77dee3 95825->95827 95828 77df31 GetSystemInfo 95825->95828 95826 77dea4 GetCurrentProcess 95856 77df5f LoadLibraryA GetProcAddress 95826->95856 95850 77e00c 95827->95850 95831 77df0e 95828->95831 95829->95823 95847 77df77 95829->95847 95834 77df21 95831->95834 95835 77df1c FreeLibrary 95831->95835 95834->95805 95835->95834 95836 77df29 GetSystemInfo 95838 77df03 95836->95838 95837 77def9 95853 77dff4 95837->95853 95838->95831 95841 77df09 FreeLibrary 95838->95841 95841->95831 95842->95812 95844 77dfbd 95843->95844 95845 76b18b 48 API calls 95844->95845 95846 77de22 95845->95846 95846->95821 95857 77df89 95847->95857 95861 77e01e 95850->95861 95854 77e00c 2 API calls 95853->95854 95855 77df01 GetNativeSystemInfo 95854->95855 95855->95838 95856->95825 95858 77dea0 95857->95858 95859 77df92 LoadLibraryA 95857->95859 95858->95825 95858->95826 95859->95858 95860 77dfa3 GetProcAddress 95859->95860 95860->95858 95862 77def1 95861->95862 95863 77e027 LoadLibraryA 95861->95863 95862->95836 95862->95837 95863->95862 95864 77e038 GetProcAddress 95863->95864 95864->95862 95865 d68370 95866 d6842b 95865->95866 95878 d68260 95866->95878 95868 d68454 CreateFileW 95870 d684a3 95868->95870 95871 d684a8 95868->95871 95871->95870 95872 d684bf VirtualAlloc 95871->95872 95872->95870 95873 d684dd ReadFile 95872->95873 95873->95870 95874 d684f8 95873->95874 95875 d67260 12 API calls 95874->95875 95876 d6852b 95875->95876 95877 d6854e ExitProcess 95876->95877 95877->95870 95879 d68269 Sleep 95878->95879 95880 d68277 95879->95880 95881 7d19cb 95886 762322 95881->95886 95883 7d19d1 95919 780f0a 52 API calls __cinit 95883->95919 95885 7d19db 95887 762344 95886->95887 95920 7626df 95887->95920 95892 76d7f7 48 API calls 95893 762384 95892->95893 95894 76d7f7 48 API calls 95893->95894 95895 76238e 95894->95895 95896 76d7f7 48 API calls 95895->95896 95897 762398 95896->95897 95898 76d7f7 48 API calls 95897->95898 95899 7623de 95898->95899 95900 76d7f7 48 API calls 95899->95900 95901 7624c1 95900->95901 95928 76263f 95901->95928 95905 7624f1 95906 76d7f7 48 API calls 95905->95906 95907 7624fb 95906->95907 95957 762745 95907->95957 95909 762546 95910 762556 GetStdHandle 95909->95910 95911 7d501d 95910->95911 95912 7625b1 95910->95912 95911->95912 95914 7d5026 95911->95914 95913 7625b7 CoInitialize 95912->95913 95913->95883 95964 7a92d4 53 API calls 95914->95964 95916 7d502d 95965 7a99f9 CreateThread 95916->95965 95918 7d5039 CloseHandle 95918->95913 95919->95885 95966 762854 95920->95966 95923 766a63 48 API calls 95924 76234a 95923->95924 95925 76272e 95924->95925 95980 7627ec 6 API calls 95925->95980 95927 76237a 95927->95892 95929 76d7f7 48 API calls 95928->95929 95930 76264f 95929->95930 95931 76d7f7 48 API calls 95930->95931 95932 762657 95931->95932 95981 7626a7 95932->95981 95935 7626a7 48 API calls 95936 762667 95935->95936 95937 76d7f7 48 API calls 95936->95937 95938 762672 95937->95938 95939 77f4ea 48 API calls 95938->95939 95940 7624cb 95939->95940 95941 7622a4 95940->95941 95942 7622b2 95941->95942 95943 76d7f7 48 API calls 95942->95943 95944 7622bd 95943->95944 95945 76d7f7 48 API calls 95944->95945 95946 7622c8 95945->95946 95947 76d7f7 48 API calls 95946->95947 95948 7622d3 95947->95948 95949 76d7f7 48 API calls 95948->95949 95950 7622de 95949->95950 95951 7626a7 48 API calls 95950->95951 95952 7622e9 95951->95952 95953 77f4ea 48 API calls 95952->95953 95954 7622f0 95953->95954 95955 7d1fe7 95954->95955 95956 7622f9 RegisterWindowMessageW 95954->95956 95956->95905 95958 7d5f4d 95957->95958 95959 762755 95957->95959 95986 7ac942 50 API calls 95958->95986 95960 77f4ea 48 API calls 95959->95960 95963 76275d 95960->95963 95962 7d5f58 95963->95909 95964->95916 95965->95918 95987 7a99df 54 API calls 95965->95987 95973 762870 95966->95973 95969 762870 48 API calls 95970 762864 95969->95970 95971 76d7f7 48 API calls 95970->95971 95972 762716 95971->95972 95972->95923 95974 76d7f7 48 API calls 95973->95974 95975 76287b 95974->95975 95976 76d7f7 48 API calls 95975->95976 95977 762883 95976->95977 95978 76d7f7 48 API calls 95977->95978 95979 76285c 95978->95979 95979->95969 95980->95927 95982 76d7f7 48 API calls 95981->95982 95983 7626b0 95982->95983 95984 76d7f7 48 API calls 95983->95984 95985 76265f 95984->95985 95985->95935 95986->95962 95988 7d19ba 95993 77c75a 95988->95993 95992 7d19c9 95994 76d7f7 48 API calls 95993->95994 95995 77c7c8 95994->95995 96001 77d26c 95995->96001 95998 77c865 95999 77c881 95998->95999 96004 77d1fa 48 API calls ___crtGetEnvironmentStringsW 95998->96004 96000 780f0a 52 API calls __cinit 95999->96000 96000->95992 96005 77d298 96001->96005 96004->95998 96006 77d2a5 96005->96006 96007 77d28b 96005->96007 96006->96007 96008 77d2ac RegOpenKeyExW 96006->96008 96007->95998 96008->96007 96009 77d2c6 RegQueryValueExW 96008->96009 96010 77d2e7 96009->96010 96011 77d2fc RegCloseKey 96009->96011 96010->96011 96011->96007

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 857 78b043-78b080 call 78f8a0 860 78b089-78b08b 857->860 861 78b082-78b084 857->861 863 78b0ac-78b0d9 860->863 864 78b08d-78b0a7 call 787bda call 787c0e call 786e10 860->864 862 78b860-78b86c call 78a70c 861->862 867 78b0db-78b0de 863->867 868 78b0e0-78b0e7 863->868 864->862 867->868 873 78b10b-78b110 867->873 869 78b0e9-78b100 call 787bda call 787c0e call 786e10 868->869 870 78b105 868->870 903 78b851-78b854 869->903 870->873 876 78b11f-78b12d call 793bf2 873->876 877 78b112-78b11c call 78f82f 873->877 888 78b44b-78b45d 876->888 889 78b133-78b145 876->889 877->876 891 78b7b8-78b7d5 WriteFile 888->891 892 78b463-78b473 888->892 889->888 890 78b14b-78b183 call 787a0d GetConsoleMode 889->890 890->888 908 78b189-78b18f 890->908 898 78b7e1-78b7e7 GetLastError 891->898 899 78b7d7-78b7df 891->899 895 78b479-78b484 892->895 896 78b55a-78b55f 892->896 901 78b48a-78b49a 895->901 902 78b81b-78b833 895->902 905 78b663-78b66e 896->905 906 78b565-78b56e 896->906 904 78b7e9 898->904 899->904 909 78b4a0-78b4a3 901->909 910 78b83e-78b84e call 787c0e call 787bda 902->910 911 78b835-78b838 902->911 907 78b85e-78b85f 903->907 913 78b7ef-78b7f1 904->913 905->902 912 78b674 905->912 906->902 914 78b574 906->914 907->862 916 78b199-78b1bc GetConsoleCP 908->916 917 78b191-78b193 908->917 918 78b4e9-78b520 WriteFile 909->918 919 78b4a5-78b4be 909->919 910->903 911->910 920 78b83a-78b83c 911->920 921 78b67e-78b693 912->921 923 78b7f3-78b7f5 913->923 924 78b856-78b85c 913->924 915 78b57e-78b595 914->915 925 78b59b-78b59e 915->925 926 78b440-78b446 916->926 927 78b1c2-78b1ca 916->927 917->888 917->916 918->898 930 78b526-78b538 918->930 928 78b4cb-78b4e7 919->928 929 78b4c0-78b4ca 919->929 920->907 931 78b699-78b69b 921->931 923->902 933 78b7f7-78b7fc 923->933 924->907 936 78b5de-78b627 WriteFile 925->936 937 78b5a0-78b5b6 925->937 926->923 938 78b1d4-78b1d6 927->938 928->909 928->918 929->928 930->913 939 78b53e-78b54f 930->939 940 78b6d8-78b719 WideCharToMultiByte 931->940 941 78b69d-78b6b3 931->941 934 78b7fe-78b810 call 787c0e call 787bda 933->934 935 78b812-78b819 call 787bed 933->935 934->903 935->903 936->898 948 78b62d-78b645 936->948 945 78b5b8-78b5ca 937->945 946 78b5cd-78b5dc 937->946 949 78b36b-78b36e 938->949 950 78b1dc-78b1fe 938->950 939->901 951 78b555 939->951 940->898 944 78b71f-78b721 940->944 952 78b6b5-78b6c4 941->952 953 78b6c7-78b6d6 941->953 956 78b727-78b75a WriteFile 944->956 945->946 946->925 946->936 948->913 958 78b64b-78b658 948->958 961 78b370-78b373 949->961 962 78b375-78b3a2 949->962 959 78b200-78b215 950->959 960 78b217-78b223 call 781688 950->960 951->913 952->953 953->931 953->940 965 78b77a-78b78e GetLastError 956->965 966 78b75c-78b776 956->966 958->915 967 78b65e 958->967 968 78b271-78b283 call 7940f7 959->968 981 78b269-78b26b 960->981 982 78b225-78b239 960->982 961->962 963 78b3a8-78b3ab 961->963 962->963 970 78b3ad-78b3b0 963->970 971 78b3b2-78b3c5 call 795884 963->971 975 78b794-78b796 965->975 966->956 973 78b778 966->973 967->913 984 78b289 968->984 985 78b435-78b43b 968->985 970->971 977 78b407-78b40a 970->977 971->898 990 78b3cb-78b3d5 971->990 973->975 975->904 980 78b798-78b7b0 975->980 977->938 987 78b410 977->987 980->921 986 78b7b6 980->986 981->968 988 78b23f-78b254 call 7940f7 982->988 989 78b412-78b42d 982->989 991 78b28f-78b2c4 WideCharToMultiByte 984->991 985->904 986->913 987->985 988->985 997 78b25a-78b267 988->997 989->985 994 78b3fb-78b401 990->994 995 78b3d7-78b3ee call 795884 990->995 991->985 996 78b2ca-78b2f0 WriteFile 991->996 994->977 995->898 1002 78b3f4-78b3f5 995->1002 996->898 999 78b2f6-78b30e 996->999 997->991 999->985 1001 78b314-78b31b 999->1001 1001->994 1003 78b321-78b34c WriteFile 1001->1003 1002->994 1003->898 1004 78b352-78b359 1003->1004 1004->985 1005 78b35f-78b366 1004->1005 1005->994
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 88cd4f3698552bf345a0cff7252e389da9876a7f02b6fc4e0b523e860a7d3e15
                                                              • Instruction ID: 7d071d0c2bf4036230f29bf00d7e1453cdf9fdc8f6dcb00d58a3ea5bd297bd37
                                                              • Opcode Fuzzy Hash: 88cd4f3698552bf345a0cff7252e389da9876a7f02b6fc4e0b523e860a7d3e15
                                                              • Instruction Fuzzy Hash: EB326D75B422688FCB24AF54DC856E9B7B5FF4A310F1840D9E40AE7A91D7389E80CF52

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00763AA3,?), ref: 00763D45
                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,00763AA3,?), ref: 00763D57
                                                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,00821148,00821130,?,?,?,?,00763AA3,?), ref: 00763DC8
                                                                • Part of subcall function 00766430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00763DEE,00821148,?,?,?,?,?,00763AA3,?), ref: 00766471
                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,00763AA3,?), ref: 00763E48
                                                              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,008128F4,00000010), ref: 007D1CCE
                                                              • SetCurrentDirectoryW.KERNEL32(?,00821148,?,?,?,?,?,00763AA3,?), ref: 007D1D06
                                                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,007FDAB4,00821148,?,?,?,?,?,00763AA3,?), ref: 007D1D89
                                                              • ShellExecuteW.SHELL32(00000000,?,?,?,?,00763AA3), ref: 007D1D90
                                                                • Part of subcall function 00763E6E: GetSysColorBrush.USER32(0000000F), ref: 00763E79
                                                                • Part of subcall function 00763E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00763E88
                                                                • Part of subcall function 00763E6E: LoadIconW.USER32(00000063), ref: 00763E9E
                                                                • Part of subcall function 00763E6E: LoadIconW.USER32(000000A4), ref: 00763EB0
                                                                • Part of subcall function 00763E6E: LoadIconW.USER32(000000A2), ref: 00763EC2
                                                                • Part of subcall function 00763E6E: RegisterClassExW.USER32(?), ref: 00763F30
                                                                • Part of subcall function 007636B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 007636E6
                                                                • Part of subcall function 007636B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00763707
                                                                • Part of subcall function 007636B8: ShowWindow.USER32(00000000,?,?,?,?,00763AA3,?), ref: 0076371B
                                                                • Part of subcall function 007636B8: ShowWindow.USER32(00000000,?,?,?,?,00763AA3,?), ref: 00763724
                                                                • Part of subcall function 00764FFC: _memset.LIBCMT ref: 00765022
                                                                • Part of subcall function 00764FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 007650CB
                                                              Strings
                                                              • runas, xrefs: 007D1D84
                                                              • This is a third-party compiled AutoIt script., xrefs: 007D1CC8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                                              • String ID: This is a third-party compiled AutoIt script.$runas
                                                              • API String ID: 438480954-3287110873
                                                              • Opcode ID: 56cef713b3878b8f9e041b89c1c5cb9415844e95bc696b14c15095a31d591269
                                                              • Instruction ID: 727132325590305f13869d1d946ed7ed403898ba5915e539c6d513c6fbd25f77
                                                              • Opcode Fuzzy Hash: 56cef713b3878b8f9e041b89c1c5cb9415844e95bc696b14c15095a31d591269
                                                              • Instruction Fuzzy Hash: 3B51E830A04288FACF21ABF4DC49DED7B75BF19700F108165F953A6292DA7D4A5ACB31

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1288 77ddc0-77de4f call 76d7f7 GetVersionExW call 766a63 call 77dfb4 call 766571 1297 77de55-77de56 1288->1297 1298 7d24c8-7d24cb 1288->1298 1299 77de92-77dea2 call 77df77 1297->1299 1300 77de58-77de63 1297->1300 1301 7d24cd 1298->1301 1302 7d24e4-7d24e8 1298->1302 1319 77dec7-77dee1 1299->1319 1320 77dea4-77dec1 GetCurrentProcess call 77df5f 1299->1320 1305 7d244e-7d2454 1300->1305 1306 77de69-77de6b 1300->1306 1308 7d24d0 1301->1308 1303 7d24ea-7d24f3 1302->1303 1304 7d24d3-7d24dc 1302->1304 1303->1308 1311 7d24f5-7d24f8 1303->1311 1304->1302 1309 7d245e-7d2464 1305->1309 1310 7d2456-7d2459 1305->1310 1312 7d2469-7d2475 1306->1312 1313 77de71-77de74 1306->1313 1308->1304 1309->1299 1310->1299 1311->1304 1315 7d247f-7d2485 1312->1315 1316 7d2477-7d247a 1312->1316 1317 7d2495-7d2498 1313->1317 1318 77de7a-77de89 1313->1318 1315->1299 1316->1299 1317->1299 1323 7d249e-7d24b3 1317->1323 1324 7d248a-7d2490 1318->1324 1325 77de8f 1318->1325 1321 77dee3-77def7 call 77e00c 1319->1321 1322 77df31-77df3b GetSystemInfo 1319->1322 1320->1319 1339 77dec3 1320->1339 1336 77df29-77df2f GetSystemInfo 1321->1336 1337 77def9-77df01 call 77dff4 GetNativeSystemInfo 1321->1337 1327 77df0e-77df1a 1322->1327 1329 7d24bd-7d24c3 1323->1329 1330 7d24b5-7d24b8 1323->1330 1324->1299 1325->1299 1333 77df21-77df26 1327->1333 1334 77df1c-77df1f FreeLibrary 1327->1334 1329->1299 1330->1299 1334->1333 1338 77df03-77df07 1336->1338 1337->1338 1338->1327 1342 77df09-77df0c FreeLibrary 1338->1342 1339->1319 1342->1327
                                                              APIs
                                                              • GetVersionExW.KERNEL32(?), ref: 0077DDEC
                                                              • GetCurrentProcess.KERNEL32(00000000,007FDC38,?,?), ref: 0077DEAC
                                                              • GetNativeSystemInfo.KERNELBASE(?,007FDC38,?,?), ref: 0077DF01
                                                              • FreeLibrary.KERNEL32(00000000,?,?), ref: 0077DF0C
                                                              • FreeLibrary.KERNEL32(00000000,?,?), ref: 0077DF1F
                                                              • GetSystemInfo.KERNEL32(?,007FDC38,?,?), ref: 0077DF29
                                                              • GetSystemInfo.KERNEL32(?,007FDC38,?,?), ref: 0077DF35
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                                              • String ID:
                                                              • API String ID: 3851250370-0
                                                              • Opcode ID: 19f7087166365360f2b017264b6771d2a8b2c9444981c62063a5c63c906afb69
                                                              • Instruction ID: 165904eb253098f159161ce438b9f6a8c3ba15617ca6f61d937ca0cdc734fe52
                                                              • Opcode Fuzzy Hash: 19f7087166365360f2b017264b6771d2a8b2c9444981c62063a5c63c906afb69
                                                              • Instruction Fuzzy Hash: 186181B180A3C4DFCF26CF6898C15E97FB46F39300B1985D9D8499F207C6688D0ACB66

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1360 76406b-764083 CreateStreamOnHGlobal 1361 764085-76409c FindResourceExW 1360->1361 1362 7640a3-7640a6 1360->1362 1363 7640a2 1361->1363 1364 7d4f16-7d4f25 LoadResource 1361->1364 1363->1362 1364->1363 1365 7d4f2b-7d4f39 SizeofResource 1364->1365 1365->1363 1366 7d4f3f-7d4f4a LockResource 1365->1366 1366->1363 1367 7d4f50-7d4f6e 1366->1367 1367->1363
                                                              APIs
                                                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,0076449E,?,?,00000000,00000001), ref: 0076407B
                                                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,0076449E,?,?,00000000,00000001), ref: 00764092
                                                              • LoadResource.KERNEL32(?,00000000,?,?,0076449E,?,?,00000000,00000001,?,?,?,?,?,?,007641FB), ref: 007D4F1A
                                                              • SizeofResource.KERNEL32(?,00000000,?,?,0076449E,?,?,00000000,00000001,?,?,?,?,?,?,007641FB), ref: 007D4F2F
                                                              • LockResource.KERNEL32(0076449E,?,?,0076449E,?,?,00000000,00000001,?,?,?,?,?,?,007641FB,00000000), ref: 007D4F42
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                              • String ID: SCRIPT
                                                              • API String ID: 3051347437-3967369404
                                                              • Opcode ID: 11e0bfa99c2950aab22ddfc502433c91a9bd78d3993ee4efbc747e7ed25dd1c7
                                                              • Instruction ID: 270818d9ec3051b836b11e4d5cd0477fb621190bf549936298479d91216e06dd
                                                              • Opcode Fuzzy Hash: 11e0bfa99c2950aab22ddfc502433c91a9bd78d3993ee4efbc747e7ed25dd1c7
                                                              • Instruction Fuzzy Hash: 8F115E71200751AFE7318B66DC88F677BBDEBC9B51F14816CF6128A6A0DA75DC408A30
                                                              APIs
                                                              • GetFileAttributesW.KERNELBASE(?,007D2F49), ref: 007A6CB9
                                                              • FindFirstFileW.KERNELBASE(?,?), ref: 007A6CCA
                                                              • FindClose.KERNEL32(00000000), ref: 007A6CDA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: FileFind$AttributesCloseFirst
                                                              • String ID:
                                                              • API String ID: 48322524-0
                                                              • Opcode ID: 90240b3f8d38dfc563646e6f96c665b98036373d055171d04a6fb6ffc6daca61
                                                              • Instruction ID: 287b022b43ac714c61a91a51b72d3867f0a476fd0a58a4d3c8c03ce5c375b96e
                                                              • Opcode Fuzzy Hash: 90240b3f8d38dfc563646e6f96c665b98036373d055171d04a6fb6ffc6daca61
                                                              • Instruction Fuzzy Hash: 3DE0D8358114149B82306738EC4D4E9376CDE4A339F104705F971C11D0E778ED1055E9
                                                              APIs
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0076E959
                                                              • timeGetTime.WINMM ref: 0076EBFA
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0076ED2E
                                                              • TranslateMessage.USER32(?), ref: 0076ED3F
                                                              • DispatchMessageW.USER32(?), ref: 0076ED4A
                                                              • LockWindowUpdate.USER32(00000000), ref: 0076ED79
                                                              • DestroyWindow.USER32 ref: 0076ED85
                                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0076ED9F
                                                              • Sleep.KERNEL32(0000000A), ref: 007D5270
                                                              • TranslateMessage.USER32(?), ref: 007D59F7
                                                              • DispatchMessageW.USER32(?), ref: 007D5A05
                                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 007D5A19
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                                              • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                              • API String ID: 2641332412-570651680
                                                              • Opcode ID: f768f961065e20b9cbc10bec5f1d8d123d2e7afb5d33dce23430fe485c5bbb14
                                                              • Instruction ID: 9dc41583d92976fd47a6f6175cebf47dc6d179b6fd269d46c4dfa7a700d5cefa
                                                              • Opcode Fuzzy Hash: f768f961065e20b9cbc10bec5f1d8d123d2e7afb5d33dce23430fe485c5bbb14
                                                              • Instruction Fuzzy Hash: 6462B370504340DFEB25DF24C889BAA77E4BF54304F14496EFD8B8B292DB79A845CB62
                                                              APIs
                                                              • ___createFile.LIBCMT ref: 00795EC3
                                                              • ___createFile.LIBCMT ref: 00795F04
                                                              • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00795F2D
                                                              • __dosmaperr.LIBCMT ref: 00795F34
                                                              • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00795F47
                                                              • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00795F6A
                                                              • __dosmaperr.LIBCMT ref: 00795F73
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00795F7C
                                                              • __set_osfhnd.LIBCMT ref: 00795FAC
                                                              • __lseeki64_nolock.LIBCMT ref: 00796016
                                                              • __close_nolock.LIBCMT ref: 0079603C
                                                              • __chsize_nolock.LIBCMT ref: 0079606C
                                                              • __lseeki64_nolock.LIBCMT ref: 0079607E
                                                              • __lseeki64_nolock.LIBCMT ref: 00796176
                                                              • __lseeki64_nolock.LIBCMT ref: 0079618B
                                                              • __close_nolock.LIBCMT ref: 007961EB
                                                                • Part of subcall function 0078EA9C: CloseHandle.KERNELBASE(00000000,0080EEF4,00000000,?,00796041,0080EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0078EAEC
                                                                • Part of subcall function 0078EA9C: GetLastError.KERNEL32(?,00796041,0080EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0078EAF6
                                                                • Part of subcall function 0078EA9C: __free_osfhnd.LIBCMT ref: 0078EB03
                                                                • Part of subcall function 0078EA9C: __dosmaperr.LIBCMT ref: 0078EB25
                                                                • Part of subcall function 00787C0E: __getptd_noexit.LIBCMT ref: 00787C0E
                                                              • __lseeki64_nolock.LIBCMT ref: 0079620D
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00796342
                                                              • ___createFile.LIBCMT ref: 00796361
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0079636E
                                                              • __dosmaperr.LIBCMT ref: 00796375
                                                              • __free_osfhnd.LIBCMT ref: 00796395
                                                              • __invoke_watson.LIBCMT ref: 007963C3
                                                              • __wsopen_helper.LIBCMT ref: 007963DD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                                              • String ID: @
                                                              • API String ID: 3896587723-2766056989
                                                              • Opcode ID: b853e3c91c66a0a16dfaf6e3075962ce1a63a14d35bff97851951fcf425dff2f
                                                              • Instruction ID: 4be15935cf9a38fbd424c485703d1b944e1ec825c28d5387f1bd1ae2cb147825
                                                              • Opcode Fuzzy Hash: b853e3c91c66a0a16dfaf6e3075962ce1a63a14d35bff97851951fcf425dff2f
                                                              • Instruction Fuzzy Hash: 0B221771A0461A9FEF2A9F68EC89BBD7B71FB15324F244229E9219B2D1C33D8D40C751
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __getptd_noexit
                                                              • String ID:
                                                              • API String ID: 3074181302-0
                                                              • Opcode ID: cd50a5737c5b74057d0cc17e9a89bdb570e13dced48d2b156e941ed3cac5f83e
                                                              • Instruction ID: 248bab33747b397dcc413d2444317a31378777909ef312171f96ba037cc5ea91
                                                              • Opcode Fuzzy Hash: cd50a5737c5b74057d0cc17e9a89bdb570e13dced48d2b156e941ed3cac5f83e
                                                              • Instruction Fuzzy Hash: 07323870E84285DFDB31AF68D884BAD7BB1BF55314F24806AE8559F293D7389C42CB60

                                                              Control-flow Graph

                                                              APIs
                                                              • _wcscpy.LIBCMT ref: 007AFA96
                                                              • _wcschr.LIBCMT ref: 007AFAA4
                                                              • _wcscpy.LIBCMT ref: 007AFABB
                                                              • _wcscat.LIBCMT ref: 007AFACA
                                                              • _wcscat.LIBCMT ref: 007AFAE8
                                                              • _wcscpy.LIBCMT ref: 007AFB09
                                                              • __wsplitpath.LIBCMT ref: 007AFBE6
                                                              • _wcscpy.LIBCMT ref: 007AFC0B
                                                              • _wcscpy.LIBCMT ref: 007AFC1D
                                                              • _wcscpy.LIBCMT ref: 007AFC32
                                                              • _wcscat.LIBCMT ref: 007AFC47
                                                              • _wcscat.LIBCMT ref: 007AFC59
                                                              • _wcscat.LIBCMT ref: 007AFC6E
                                                                • Part of subcall function 007ABFA4: _wcscmp.LIBCMT ref: 007AC03E
                                                                • Part of subcall function 007ABFA4: __wsplitpath.LIBCMT ref: 007AC083
                                                                • Part of subcall function 007ABFA4: _wcscpy.LIBCMT ref: 007AC096
                                                                • Part of subcall function 007ABFA4: _wcscat.LIBCMT ref: 007AC0A9
                                                                • Part of subcall function 007ABFA4: __wsplitpath.LIBCMT ref: 007AC0CE
                                                                • Part of subcall function 007ABFA4: _wcscat.LIBCMT ref: 007AC0E4
                                                                • Part of subcall function 007ABFA4: _wcscat.LIBCMT ref: 007AC0F7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                                              • String ID: >>>AUTOIT SCRIPT<<<
                                                              • API String ID: 2955681530-2806939583
                                                              • Opcode ID: 6dab1d4149a3aacb63bb3be131202391f4f4af824919bb3b7f24051b0af4b8a7
                                                              • Instruction ID: 306724e51399903ebec881fb0e2dde4ff45a2d272c3b9010f09da836f75654b4
                                                              • Opcode Fuzzy Hash: 6dab1d4149a3aacb63bb3be131202391f4f4af824919bb3b7f24051b0af4b8a7
                                                              • Instruction Fuzzy Hash: 6B91A272504205DFCB20EB60C855E9AB3E8BF95310F044969F95997291DB38EA48CBA2

                                                              Control-flow Graph

                                                              APIs
                                                              • GetSysColorBrush.USER32(0000000F), ref: 00763F86
                                                              • RegisterClassExW.USER32(00000030), ref: 00763FB0
                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00763FC1
                                                              • InitCommonControlsEx.COMCTL32(?), ref: 00763FDE
                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00763FEE
                                                              • LoadIconW.USER32(000000A9), ref: 00764004
                                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00764013
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                              • API String ID: 2914291525-1005189915
                                                              • Opcode ID: a9bdcc860ab0d38d756e6fb456bb65f8ddd0a1c3fcf1e41929dd87785adc978b
                                                              • Instruction ID: f180f2a0058709bf8bc35974352a8edf78a863057970491d82970da55ff75f1d
                                                              • Opcode Fuzzy Hash: a9bdcc860ab0d38d756e6fb456bb65f8ddd0a1c3fcf1e41929dd87785adc978b
                                                              • Instruction Fuzzy Hash: 2A21F9B5901348AFDF20DFA4EC89BCDBBB4FB18700F10811AF611AA2A0D7B505458F94

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1007 7abfa4-7ac054 call 78f8a0 call 77f4ea call 7647b7 call 7abdb4 call 764517 call 7815e3 1020 7ac05a-7ac061 call 7ac56d 1007->1020 1021 7ac107-7ac10e call 7ac56d 1007->1021 1026 7ac110-7ac112 1020->1026 1027 7ac067-7ac105 call 781dfc call 780d23 call 780cf4 call 781dfc call 780cf4 * 2 1020->1027 1021->1026 1028 7ac117 1021->1028 1029 7ac367-7ac368 1026->1029 1031 7ac11a-7ac1d6 call 7644ed * 8 call 7ac71a call 783499 1027->1031 1028->1031 1034 7ac385-7ac393 call 7647e2 1029->1034 1066 7ac1d8-7ac1da 1031->1066 1067 7ac1df-7ac1fa call 7abdf8 1031->1067 1066->1029 1070 7ac28c-7ac298 call 7835e4 1067->1070 1071 7ac200-7ac208 1067->1071 1078 7ac29a-7ac2a9 DeleteFileW 1070->1078 1079 7ac2ae-7ac2b2 1070->1079 1072 7ac20a-7ac20e 1071->1072 1073 7ac210 1071->1073 1075 7ac215-7ac233 call 7644ed 1072->1075 1073->1075 1083 7ac25d-7ac273 call 7ab791 call 782aae 1075->1083 1084 7ac235-7ac23b 1075->1084 1078->1029 1081 7ac2b8-7ac32f call 7ac81d call 7ac845 call 7ab965 1079->1081 1082 7ac342-7ac356 CopyFileW 1079->1082 1086 7ac36a-7ac380 DeleteFileW call 7ac6d9 1081->1086 1103 7ac331-7ac340 DeleteFileW 1081->1103 1082->1086 1087 7ac358-7ac365 DeleteFileW 1082->1087 1100 7ac278-7ac283 1083->1100 1088 7ac23d-7ac250 call 7abf2e 1084->1088 1086->1034 1087->1029 1098 7ac252-7ac25b 1088->1098 1098->1083 1100->1071 1102 7ac289 1100->1102 1102->1070 1103->1029
                                                              APIs
                                                                • Part of subcall function 007ABDB4: __time64.LIBCMT ref: 007ABDBE
                                                                • Part of subcall function 00764517: _fseek.LIBCMT ref: 0076452F
                                                              • __wsplitpath.LIBCMT ref: 007AC083
                                                                • Part of subcall function 00781DFC: __wsplitpath_helper.LIBCMT ref: 00781E3C
                                                              • _wcscpy.LIBCMT ref: 007AC096
                                                              • _wcscat.LIBCMT ref: 007AC0A9
                                                              • __wsplitpath.LIBCMT ref: 007AC0CE
                                                              • _wcscat.LIBCMT ref: 007AC0E4
                                                              • _wcscat.LIBCMT ref: 007AC0F7
                                                              • _wcscmp.LIBCMT ref: 007AC03E
                                                                • Part of subcall function 007AC56D: _wcscmp.LIBCMT ref: 007AC65D
                                                                • Part of subcall function 007AC56D: _wcscmp.LIBCMT ref: 007AC670
                                                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007AC2A1
                                                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 007AC338
                                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 007AC34E
                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007AC35F
                                                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007AC371
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                                              • String ID:
                                                              • API String ID: 2378138488-0
                                                              • Opcode ID: bf70b8bba4aa518581186aa8b972e71ac9eff49105e18fa9f729cf4a6c0ec164
                                                              • Instruction ID: 0600f85d6bdbda5189001227a8423d179a29590b2f2839fbdad9748b75471743
                                                              • Opcode Fuzzy Hash: bf70b8bba4aa518581186aa8b972e71ac9eff49105e18fa9f729cf4a6c0ec164
                                                              • Instruction Fuzzy Hash: F0C13CB1A00119EFDF11DF94CC85EDEBBBDAF89300F0041A6F609E6151DB789A448F65

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1171 763742-763762 1173 763764-763767 1171->1173 1174 7637c2-7637c4 1171->1174 1176 7637c8 1173->1176 1177 763769-763770 1173->1177 1174->1173 1175 7637c6 1174->1175 1178 7637ab-7637b3 DefWindowProcW 1175->1178 1179 7637ce-7637d1 1176->1179 1180 7d1e00-7d1e2e call 762ff6 call 77e312 1176->1180 1181 763776-76377b 1177->1181 1182 76382c-763834 PostQuitMessage 1177->1182 1183 7637b9-7637bf 1178->1183 1184 7637f6-76381d SetTimer RegisterWindowMessageW 1179->1184 1185 7637d3-7637d4 1179->1185 1214 7d1e33-7d1e3a 1180->1214 1187 7d1e88-7d1e9c call 7a4ddd 1181->1187 1188 763781-763783 1181->1188 1189 7637f2-7637f4 1182->1189 1184->1189 1193 76381f-76382a CreatePopupMenu 1184->1193 1190 7637da-7637ed KillTimer call 763847 call 76390f 1185->1190 1191 7d1da3-7d1da6 1185->1191 1187->1189 1205 7d1ea2 1187->1205 1194 763836-763840 call 77eb83 1188->1194 1195 763789-76378e 1188->1195 1189->1183 1190->1189 1198 7d1ddc-7d1dfb MoveWindow 1191->1198 1199 7d1da8-7d1daa 1191->1199 1193->1189 1206 763845 1194->1206 1202 7d1e6d-7d1e74 1195->1202 1203 763794-763799 1195->1203 1198->1189 1207 7d1dac-7d1daf 1199->1207 1208 7d1dcb-7d1dd7 SetFocus 1199->1208 1202->1178 1210 7d1e7a-7d1e83 call 79a5f3 1202->1210 1212 7d1e58-7d1e68 call 7a55bd 1203->1212 1213 76379f-7637a5 1203->1213 1205->1178 1206->1189 1207->1213 1215 7d1db5-7d1dc6 call 762ff6 1207->1215 1208->1189 1210->1178 1212->1189 1213->1178 1213->1214 1214->1178 1219 7d1e40-7d1e53 call 763847 call 764ffc 1214->1219 1215->1189 1219->1178
                                                              APIs
                                                              • DefWindowProcW.USER32(?,?,?,?), ref: 007637B3
                                                              • KillTimer.USER32(?,00000001), ref: 007637DD
                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00763800
                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0076380B
                                                              • CreatePopupMenu.USER32 ref: 0076381F
                                                              • PostQuitMessage.USER32(00000000), ref: 0076382E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                              • String ID: TaskbarCreated
                                                              • API String ID: 129472671-2362178303
                                                              • Opcode ID: ae025300dff21bf1d8ba31f716b2655aa67fbdf273a3a3120efa93f09f5ae188
                                                              • Instruction ID: 17df91936270d663dc3bbb6d0fea6fb80f81d55299126a8b2f46685ac0c61b83
                                                              • Opcode Fuzzy Hash: ae025300dff21bf1d8ba31f716b2655aa67fbdf273a3a3120efa93f09f5ae188
                                                              • Instruction Fuzzy Hash: EF4125F120028AABDF205F68ACCEFBA36A5F754341F584129FE03D6191CB6CAE51D761

                                                              Control-flow Graph

                                                              APIs
                                                              • GetSysColorBrush.USER32(0000000F), ref: 00763E79
                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00763E88
                                                              • LoadIconW.USER32(00000063), ref: 00763E9E
                                                              • LoadIconW.USER32(000000A4), ref: 00763EB0
                                                              • LoadIconW.USER32(000000A2), ref: 00763EC2
                                                                • Part of subcall function 00764024: LoadImageW.USER32(00760000,00000063,00000001,00000010,00000010,00000000), ref: 00764048
                                                              • RegisterClassExW.USER32(?), ref: 00763F30
                                                                • Part of subcall function 00763F53: GetSysColorBrush.USER32(0000000F), ref: 00763F86
                                                                • Part of subcall function 00763F53: RegisterClassExW.USER32(00000030), ref: 00763FB0
                                                                • Part of subcall function 00763F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00763FC1
                                                                • Part of subcall function 00763F53: InitCommonControlsEx.COMCTL32(?), ref: 00763FDE
                                                                • Part of subcall function 00763F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00763FEE
                                                                • Part of subcall function 00763F53: LoadIconW.USER32(000000A9), ref: 00764004
                                                                • Part of subcall function 00763F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00764013
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                              • String ID: #$0$AutoIt v3
                                                              • API String ID: 423443420-4155596026
                                                              • Opcode ID: c2952b4caec47fe4b4fdbd467e49508d1b9d4804002ea3f156fc8b2f49b8c1c1
                                                              • Instruction ID: 86f49b6a521f4331df8fd0ef419bdeb0d4227249a91419874f35d97b7026a94c
                                                              • Opcode Fuzzy Hash: c2952b4caec47fe4b4fdbd467e49508d1b9d4804002ea3f156fc8b2f49b8c1c1
                                                              • Instruction Fuzzy Hash: C1215EB0E00304ABDF20DFA9EC49A99BFF5FB58310F20812AE605A62A0D3754A51CF95

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1235 d685a0-d6864e 1237 d68655-d6867b call d694b0 CreateFileW 1235->1237 1240 d68682-d68692 1237->1240 1241 d6867d 1237->1241 1246 d68694 1240->1246 1247 d68699-d686b3 VirtualAlloc 1240->1247 1242 d687cd-d687d1 1241->1242 1244 d68813-d68816 1242->1244 1245 d687d3-d687d7 1242->1245 1248 d68819-d68820 1244->1248 1249 d687e3-d687e7 1245->1249 1250 d687d9-d687dc 1245->1250 1246->1242 1251 d686b5 1247->1251 1252 d686ba-d686d1 ReadFile 1247->1252 1253 d68875-d6888a 1248->1253 1254 d68822-d6882d 1248->1254 1255 d687f7-d687fb 1249->1255 1256 d687e9-d687f3 1249->1256 1250->1249 1251->1242 1261 d686d3 1252->1261 1262 d686d8-d68718 VirtualAlloc 1252->1262 1257 d6888c-d68897 VirtualFree 1253->1257 1258 d6889a-d688a2 1253->1258 1263 d68831-d6883d 1254->1263 1264 d6882f 1254->1264 1259 d687fd-d68807 1255->1259 1260 d6880b 1255->1260 1256->1255 1257->1258 1259->1260 1260->1244 1261->1242 1265 d6871f-d6873a call d69700 1262->1265 1266 d6871a 1262->1266 1267 d68851-d6885d 1263->1267 1268 d6883f-d6884f 1263->1268 1264->1253 1274 d68745-d6874f 1265->1274 1266->1242 1271 d6885f-d68868 1267->1271 1272 d6886a-d68870 1267->1272 1270 d68873 1268->1270 1270->1248 1271->1270 1272->1270 1275 d68782-d68796 call d69510 1274->1275 1276 d68751-d68780 call d69700 1274->1276 1282 d6879a-d6879e 1275->1282 1283 d68798 1275->1283 1276->1274 1284 d687a0-d687a4 CloseHandle 1282->1284 1285 d687aa-d687ae 1282->1285 1283->1242 1284->1285 1286 d687b0-d687bb VirtualFree 1285->1286 1287 d687be-d687c7 1285->1287 1286->1287 1287->1237 1287->1242
                                                              APIs
                                                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00D68671
                                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00D68897
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102902206.0000000000D66000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D66000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_d66000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CreateFileFreeVirtual
                                                              • String ID:
                                                              • API String ID: 204039940-0
                                                              • Opcode ID: 966174affad311d6204548a92a281b1da250bb1a2b19b4c878101ea01a330e63
                                                              • Instruction ID: 99170ea50a0b69d7169876a26630fff32bd3885e9297483e5e9b9bb41a1c9e44
                                                              • Opcode Fuzzy Hash: 966174affad311d6204548a92a281b1da250bb1a2b19b4c878101ea01a330e63
                                                              • Instruction Fuzzy Hash: A1A11874E00209EBDB14CFA4C898BEEBBB5FF48705F248659E501BB280DB759A41DF64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1343 7649fb-764a25 call 76bcce RegOpenKeyExW 1346 7d41cc-7d41e3 RegQueryValueExW 1343->1346 1347 764a2b-764a2f 1343->1347 1348 7d41e5-7d4222 call 77f4ea call 7647b7 RegQueryValueExW 1346->1348 1349 7d4246-7d424f RegCloseKey 1346->1349 1354 7d423d-7d4245 call 7647e2 1348->1354 1355 7d4224-7d423b call 766a63 1348->1355 1354->1349 1355->1354
                                                              APIs
                                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00764A1D
                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 007D41DB
                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 007D421A
                                                              • RegCloseKey.ADVAPI32(?), ref: 007D4249
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: QueryValue$CloseOpen
                                                              • String ID: Include$Software\AutoIt v3\AutoIt
                                                              • API String ID: 1586453840-614718249
                                                              • Opcode ID: b42e943977c84376c6182bb479b6579d8f97cfcca1cb5983c9be788f945005f2
                                                              • Instruction ID: aef15b28e47b2fd46bc59797be705fba907daa4c10b8a0196ade09b38b69a5dc
                                                              • Opcode Fuzzy Hash: b42e943977c84376c6182bb479b6579d8f97cfcca1cb5983c9be788f945005f2
                                                              • Instruction Fuzzy Hash: 08116D71601108FFEB10EBA4CD8ADBF7BBCEF04344F004059B606E6191EA78AE01DB60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1370 7636b8-763728 CreateWindowExW * 2 ShowWindow * 2
                                                              APIs
                                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 007636E6
                                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00763707
                                                              • ShowWindow.USER32(00000000,?,?,?,?,00763AA3,?), ref: 0076371B
                                                              • ShowWindow.USER32(00000000,?,?,?,?,00763AA3,?), ref: 00763724
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$CreateShow
                                                              • String ID: AutoIt v3$edit
                                                              • API String ID: 1584632944-3779509399
                                                              • Opcode ID: 87884727a8a6330be341b22d8ed27585676c685ca7b39c0345f539db1df3d71a
                                                              • Instruction ID: 8324a8c8f06bbdb77ff50ef7c9d264012e6dbc655602c3b8e83306b590c6bd53
                                                              • Opcode Fuzzy Hash: 87884727a8a6330be341b22d8ed27585676c685ca7b39c0345f539db1df3d71a
                                                              • Instruction Fuzzy Hash: 9DF054706402D47ADB3057576C4CE773E7EE7D6F20F10802FBA04962B0C1650C82CA74

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1475 d68370-d684a1 call d68260 CreateFileW 1481 d684a3 1475->1481 1482 d684a8-d684b8 1475->1482 1483 d68558-d6855d 1481->1483 1485 d684bf-d684d9 VirtualAlloc 1482->1485 1486 d684ba 1482->1486 1487 d684dd-d684f4 ReadFile 1485->1487 1488 d684db 1485->1488 1486->1483 1489 d684f6 1487->1489 1490 d684f8-d68532 call d682a0 call d67260 1487->1490 1488->1483 1489->1483 1495 d68534-d68549 call d682f0 1490->1495 1496 d6854e-d68556 ExitProcess 1490->1496 1495->1496 1496->1483
                                                              APIs
                                                                • Part of subcall function 00D68260: Sleep.KERNELBASE(000001F4), ref: 00D68271
                                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00D68497
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102902206.0000000000D66000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D66000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_d66000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CreateFileSleep
                                                              • String ID: 07RJ5NDDLH2OT
                                                              • API String ID: 2694422964-1113717179
                                                              • Opcode ID: cdbb54ab6f3390f2d296d2ca74fe5a748d9a9bd28a525851f0b95636f29fa955
                                                              • Instruction ID: 2d09ae1e5284df9244683e75d74bc74478db1b463ca87e052ebeb79a98f7bb8a
                                                              • Opcode Fuzzy Hash: cdbb54ab6f3390f2d296d2ca74fe5a748d9a9bd28a525851f0b95636f29fa955
                                                              • Instruction Fuzzy Hash: 08519270D54249EBEF10DBA4C855BEEB779AF18300F004599E209BB2C0DBB95B44DB75

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1498 764139-764160 call 7641a9 1501 764166-764174 call 7641a9 1498->1501 1502 7d3489-7d3499 call 7ac396 1498->1502 1501->1502 1509 76417a-764180 1501->1509 1505 7d349e-7d34a0 1502->1505 1507 7d34bf-7d3507 call 77f4ea 1505->1507 1508 7d34a2-7d34a5 call 764252 1505->1508 1518 7d3509-7d3526 call 76496c 1507->1518 1519 7d3528 1507->1519 1513 7d34aa-7d34b9 call 7a6b49 1508->1513 1512 764186-7641a6 call 76c833 1509->1512 1509->1513 1513->1507 1522 7d352a-7d353d 1518->1522 1519->1522 1524 7d36b4-7d36b7 call 781c9d 1522->1524 1525 7d3543 1522->1525 1529 7d36bc-7d36c5 call 764252 1524->1529 1526 7d354a-7d354d call 764f30 1525->1526 1530 7d3552-7d3574 call 76bbfc call 7a9cab 1526->1530 1535 7d36c7-7d36d7 call 764f11 call 77d8f5 1529->1535 1541 7d3588-7d3592 call 7a9c95 1530->1541 1542 7d3576-7d3583 1530->1542 1548 7d36dc-7d370c call 7a25b5 call 77f55e call 781c9d call 764252 1535->1548 1550 7d35ac-7d35b6 call 7a9c7f 1541->1550 1551 7d3594-7d35a7 1541->1551 1544 7d367b-7d368b call 76ba85 1542->1544 1544->1530 1553 7d3691-7d369b call 764dd9 1544->1553 1548->1535 1560 7d35b8-7d35c5 1550->1560 1561 7d35ca-7d35d4 call 77d90c 1550->1561 1551->1544 1559 7d36a0-7d36ae 1553->1559 1559->1524 1559->1526 1560->1544 1561->1544 1566 7d35da-7d35f2 call 7a2551 1561->1566 1572 7d3615-7d3618 1566->1572 1573 7d35f4-7d3613 call 76ce19 call 76cb37 1566->1573 1575 7d361a-7d3635 call 76ce19 call 77c2a5 call 76cb37 1572->1575 1576 7d3646-7d3649 1572->1576 1597 7d3636-7d3644 call 76bbfc 1573->1597 1575->1597 1578 7d3669-7d366c call 7a9c12 1576->1578 1579 7d364b-7d3654 call 7a2472 1576->1579 1584 7d3671-7d367a call 77f55e 1578->1584 1579->1548 1591 7d365a-7d3664 call 77f55e 1579->1591 1584->1544 1591->1530 1597->1584
                                                              APIs
                                                                • Part of subcall function 007641A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,007639FE,?,00000001), ref: 007641DB
                                                              • _free.LIBCMT ref: 007D36B7
                                                              • _free.LIBCMT ref: 007D36FE
                                                                • Part of subcall function 0076C833: __wsplitpath.LIBCMT ref: 0076C93E
                                                                • Part of subcall function 0076C833: _wcscpy.LIBCMT ref: 0076C953
                                                                • Part of subcall function 0076C833: _wcscat.LIBCMT ref: 0076C968
                                                                • Part of subcall function 0076C833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 0076C978
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                                              • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                              • API String ID: 805182592-1757145024
                                                              • Opcode ID: 93c5ff638548153074de57b658bef6df2ae8aa3be8d6967351bc5719aac6c56e
                                                              • Instruction ID: 5963e90bb446c9c843d97385a3fcc4b4b09a59a27750f234f4b25896f025dee7
                                                              • Opcode Fuzzy Hash: 93c5ff638548153074de57b658bef6df2ae8aa3be8d6967351bc5719aac6c56e
                                                              • Instruction Fuzzy Hash: C7918E71910219EFCF04EFA4CC959EEB7B4BF19310F10442AF816AB391DB78AA55CB61
                                                              APIs
                                                                • Part of subcall function 00765374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00821148,?,007661FF,?,00000000,00000001,00000000), ref: 00765392
                                                                • Part of subcall function 007649FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00764A1D
                                                              • _wcscat.LIBCMT ref: 007D2D80
                                                              • _wcscat.LIBCMT ref: 007D2DB5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _wcscat$FileModuleNameOpen
                                                              • String ID: \$\Include\
                                                              • API String ID: 3592542968-2640467822
                                                              • Opcode ID: d07c9fe78552a92312dbad31a6e7f9b56b350cfd601eeeb94ac5f0a6e2b3d888
                                                              • Instruction ID: 085b32871eb24c08fb90af4a1685a0c28a327e0f48c7d386bb8d3fa132c8cdf1
                                                              • Opcode Fuzzy Hash: d07c9fe78552a92312dbad31a6e7f9b56b350cfd601eeeb94ac5f0a6e2b3d888
                                                              • Instruction Fuzzy Hash: 0A519971504340EFC324EF59D885CAAB7F4FF59310B80852EFA45D3261EB78AA5ACB52
                                                              APIs
                                                              • __getstream.LIBCMT ref: 007834FE
                                                                • Part of subcall function 00787C0E: __getptd_noexit.LIBCMT ref: 00787C0E
                                                              • @_EH4_CallFilterFunc@8.LIBCMT ref: 00783539
                                                              • __wopenfile.LIBCMT ref: 00783549
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                                              • String ID: <G
                                                              • API String ID: 1820251861-2138716496
                                                              • Opcode ID: 8b2ed24c96304795c771a8d44b8cca074ffeaeb63e35e7886ba1ec257f0f0220
                                                              • Instruction ID: 90015d6dc0c012e4e9cc75341c20e4b2fde021a96093255927fcbc1cf8a32948
                                                              • Opcode Fuzzy Hash: 8b2ed24c96304795c771a8d44b8cca074ffeaeb63e35e7886ba1ec257f0f0220
                                                              • Instruction Fuzzy Hash: 36112C70A80206EFDB22BF788C4667E36A4BF05B60B148525F419C7281EB7CCB51D7B1
                                                              APIs
                                                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,0077D28B,SwapMouseButtons,00000004,?), ref: 0077D2BC
                                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,0077D28B,SwapMouseButtons,00000004,?,?,?,?,0077C865), ref: 0077D2DD
                                                              • RegCloseKey.KERNELBASE(00000000,?,?,0077D28B,SwapMouseButtons,00000004,?,?,?,?,0077C865), ref: 0077D2FF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CloseOpenQueryValue
                                                              • String ID: Control Panel\Mouse
                                                              • API String ID: 3677997916-824357125
                                                              • Opcode ID: 196f500f3efaa22bd9e294cc673677267ed0b5a6b8be5980bfb26a54b75b5a66
                                                              • Instruction ID: 9220dd9729bc1a10775989d9afa1ad7b8af8b626c716353e5c58ae14f33ca7b8
                                                              • Opcode Fuzzy Hash: 196f500f3efaa22bd9e294cc673677267ed0b5a6b8be5980bfb26a54b75b5a66
                                                              • Instruction Fuzzy Hash: 61113975611208FFDF208FA8CC84EEF7BB8EF48794F108869E809D7110E635AE419B64
                                                              APIs
                                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 00D67A8D
                                                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00D67AB1
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00D67AD3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102902206.0000000000D66000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D66000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_d66000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                              • String ID:
                                                              • API String ID: 2438371351-0
                                                              • Opcode ID: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                              • Instruction ID: 4b0b910a2abb52ea751c3e98907666fd530def61b6dfab638a76d9d7ecabaa12
                                                              • Opcode Fuzzy Hash: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                              • Instruction Fuzzy Hash: D9621E30A14258DBEB24CFA4C851BEEB376EF58304F1095A9D10DEB390E7759E81CB69
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                              • String ID:
                                                              • API String ID: 3877424927-0
                                                              • Opcode ID: 25276d1f646da7b76298e578b8e053e7e3b96e54df01e447abe6ae266d0f960a
                                                              • Instruction ID: b6bc0277f0fe109f925c29368feb03dfdc387725662fd774a99722edec44a669
                                                              • Opcode Fuzzy Hash: 25276d1f646da7b76298e578b8e053e7e3b96e54df01e447abe6ae266d0f960a
                                                              • Instruction Fuzzy Hash: 0851A2B0B80205EBDB24BF6DC88466E77A5AF40B20F248729F835962D0E77DDF508B50
                                                              APIs
                                                                • Part of subcall function 00764517: _fseek.LIBCMT ref: 0076452F
                                                                • Part of subcall function 007AC56D: _wcscmp.LIBCMT ref: 007AC65D
                                                                • Part of subcall function 007AC56D: _wcscmp.LIBCMT ref: 007AC670
                                                              • _free.LIBCMT ref: 007AC4DD
                                                              • _free.LIBCMT ref: 007AC4E4
                                                              • _free.LIBCMT ref: 007AC54F
                                                                • Part of subcall function 00781C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00787A85), ref: 00781CB1
                                                                • Part of subcall function 00781C9D: GetLastError.KERNEL32(00000000,?,00787A85), ref: 00781CC3
                                                              • _free.LIBCMT ref: 007AC557
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                              • String ID:
                                                              • API String ID: 1552873950-0
                                                              • Opcode ID: 0c4af10440446b1fe8382cae8d32a76f34f7d3e1743b3aef6b58de3d60be7303
                                                              • Instruction ID: 24b18842aaffc19710918bd8fd8f08a2f6027c06f18ab5557676f424af30db45
                                                              • Opcode Fuzzy Hash: 0c4af10440446b1fe8382cae8d32a76f34f7d3e1743b3aef6b58de3d60be7303
                                                              • Instruction Fuzzy Hash: B1516EB1904258EFDF159F68DC85BADBBB9EF48300F1000AEF619A3241DB755A908F59
                                                              APIs
                                                              • _memset.LIBCMT ref: 0077EBB2
                                                                • Part of subcall function 007651AF: _memset.LIBCMT ref: 0076522F
                                                                • Part of subcall function 007651AF: _wcscpy.LIBCMT ref: 00765283
                                                                • Part of subcall function 007651AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00765293
                                                              • KillTimer.USER32(?,00000001,?,?), ref: 0077EC07
                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0077EC16
                                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007D3C88
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                              • String ID:
                                                              • API String ID: 1378193009-0
                                                              • Opcode ID: 0c43ad41a6e4f7b4481386b79c48c9d4947b275b62e8f1965bdcfc93e2d079ff
                                                              • Instruction ID: f0e0892af7d75ea50b4e1fd6f1bc5a4609ac30096f4cfd58252fb16c385bf20e
                                                              • Opcode Fuzzy Hash: 0c43ad41a6e4f7b4481386b79c48c9d4947b275b62e8f1965bdcfc93e2d079ff
                                                              • Instruction Fuzzy Hash: 0E21DE745047949FEB339B24CC59BE7BFFC9B15308F04449EE69E56281C3782A84CB62
                                                              APIs
                                                              • _memset.LIBCMT ref: 007D3725
                                                              • GetOpenFileNameW.COMDLG32 ref: 007D376F
                                                                • Part of subcall function 0076660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007653B1,?,?,007661FF,?,00000000,00000001,00000000), ref: 0076662F
                                                                • Part of subcall function 007640A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007640C6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Name$Path$FileFullLongOpen_memset
                                                              • String ID: X
                                                              • API String ID: 3777226403-3081909835
                                                              • Opcode ID: 0e2d7f039312e4d675c9204d7480ff8a0024a320491c92932c924b0a3191a704
                                                              • Instruction ID: 969d41913a83681d5b7f7c83483a21f666f0d0329608256baf009009ecdd066e
                                                              • Opcode Fuzzy Hash: 0e2d7f039312e4d675c9204d7480ff8a0024a320491c92932c924b0a3191a704
                                                              • Instruction Fuzzy Hash: 88219371A10298DBCB11EFD4D8497DEBBF8AF49304F10805AE905EB241DBB85A898F65
                                                              APIs
                                                              • GetTempPathW.KERNEL32(00000104,?), ref: 007AC72F
                                                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 007AC746
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Temp$FileNamePath
                                                              • String ID: aut
                                                              • API String ID: 3285503233-3010740371
                                                              • Opcode ID: 8cf95b191e58504ad487cb86ff4829b2130d2765eac5c0ff8bdafcf036e9fcfd
                                                              • Instruction ID: 0fc3b63d5b30e88534dca4100d245480707cf46ce96d71a8cad7ef2f0aa9065c
                                                              • Opcode Fuzzy Hash: 8cf95b191e58504ad487cb86ff4829b2130d2765eac5c0ff8bdafcf036e9fcfd
                                                              • Instruction Fuzzy Hash: BBD05E7150030EABDB20AB90DC4EFCA7B6CAB04704F0041A07750E91B1DAF8EA998B58
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6d8455b71e572981cd43f362efe1e1f0576b7d1230b6535c94b29f83d6ec0dbe
                                                              • Instruction ID: a1635bae2f50fbea377546b3c2d7ceca1f098bd38d9011937289449cf34e62de
                                                              • Opcode Fuzzy Hash: 6d8455b71e572981cd43f362efe1e1f0576b7d1230b6535c94b29f83d6ec0dbe
                                                              • Instruction Fuzzy Hash: 2FF15971604301DFCB10DF24C895BAAB7E5FF88714F14892EF9999B292D738E945CB82
                                                              APIs
                                                              • __FF_MSGBANNER.LIBCMT ref: 00783973
                                                                • Part of subcall function 007881C2: __NMSG_WRITE.LIBCMT ref: 007881E9
                                                                • Part of subcall function 007881C2: __NMSG_WRITE.LIBCMT ref: 007881F3
                                                              • __NMSG_WRITE.LIBCMT ref: 0078397A
                                                                • Part of subcall function 0078821F: GetModuleFileNameW.KERNEL32(00000000,00820312,00000104,00000000,00000001,00000000), ref: 007882B1
                                                                • Part of subcall function 0078821F: ___crtMessageBoxW.LIBCMT ref: 0078835F
                                                                • Part of subcall function 00781145: ___crtCorExitProcess.LIBCMT ref: 0078114B
                                                                • Part of subcall function 00781145: ExitProcess.KERNEL32 ref: 00781154
                                                                • Part of subcall function 00787C0E: __getptd_noexit.LIBCMT ref: 00787C0E
                                                              • RtlAllocateHeap.NTDLL(00D20000,00000000,00000001,00000001,00000000,?,?,0077F507,?,0000000E), ref: 0078399F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                              • String ID:
                                                              • API String ID: 1372826849-0
                                                              • Opcode ID: 5e4995017bcd8a7e61a0b6f409808b359d2bc0f4439aba862b3970481d5e1493
                                                              • Instruction ID: 259bd040b08acc8386be6265ccb80079423845e6ca4cee5fc610b2756b8184c1
                                                              • Opcode Fuzzy Hash: 5e4995017bcd8a7e61a0b6f409808b359d2bc0f4439aba862b3970481d5e1493
                                                              • Instruction Fuzzy Hash: A101B9353C5211DAE6253B3CDC4EA2A334C9F81B68F614125F5069B192DFFCED418760
                                                              APIs
                                                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,007AC385,?,?,?,?,?,00000004), ref: 007AC6F2
                                                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,007AC385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 007AC708
                                                              • CloseHandle.KERNEL32(00000000,?,007AC385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007AC70F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: File$CloseCreateHandleTime
                                                              • String ID:
                                                              • API String ID: 3397143404-0
                                                              • Opcode ID: ee551b23453e02cfe3103fdd8cb462801f784323a39785353473dc5a37fe8580
                                                              • Instruction ID: e0039aeeae88380a5711e8c8388ee506e737833dadf705a2f145a97c80083fb8
                                                              • Opcode Fuzzy Hash: ee551b23453e02cfe3103fdd8cb462801f784323a39785353473dc5a37fe8580
                                                              • Instruction Fuzzy Hash: ECE08632141218BBDB311B54AC49FCA7B18AB09760F108210FB146D0E097B62911879C
                                                              APIs
                                                              • _free.LIBCMT ref: 007ABB72
                                                                • Part of subcall function 00781C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00787A85), ref: 00781CB1
                                                                • Part of subcall function 00781C9D: GetLastError.KERNEL32(00000000,?,00787A85), ref: 00781CC3
                                                              • _free.LIBCMT ref: 007ABB83
                                                              • _free.LIBCMT ref: 007ABB95
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: 20f76424029b3f4f106c4d8a086868d24a1af312dab904e69dcb584714f23b8e
                                                              • Instruction ID: 2129f76803f7335f43fffc7fab0d7c4062aaa651d614302275f7492052ecc906
                                                              • Opcode Fuzzy Hash: 20f76424029b3f4f106c4d8a086868d24a1af312dab904e69dcb584714f23b8e
                                                              • Instruction Fuzzy Hash: 8EE012E1681741C6DA2475796E48EB313CC4F45351754091DB459E7147DF2CE8418AB4
                                                              APIs
                                                                • Part of subcall function 007622A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,007624F1), ref: 00762303
                                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 007625A1
                                                              • CoInitialize.OLE32(00000000), ref: 00762618
                                                              • CloseHandle.KERNEL32(00000000), ref: 007D503A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                              • String ID:
                                                              • API String ID: 3815369404-0
                                                              • Opcode ID: 446d84d22c649faccbf87673e6aa8e47ee7a616dc4cc0bedf66e33bfc6a94853
                                                              • Instruction ID: 5eb580df81be72c8d560f5b45b5cb30373b8714c6bb7566975091d70e50ec876
                                                              • Opcode Fuzzy Hash: 446d84d22c649faccbf87673e6aa8e47ee7a616dc4cc0bedf66e33bfc6a94853
                                                              • Instruction Fuzzy Hash: DC71C2B4901285CACF24EF5AA99C495BBA5FB783407B0C16EE60AC77B2CB384456CF15
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __fread_nolock
                                                              • String ID: EA06
                                                              • API String ID: 2638373210-3962188686
                                                              • Opcode ID: 7c27a79f67136dc7ccf727c914b9f283877fb73691f7add5845734f153e69c9d
                                                              • Instruction ID: 76eeb19cc2f1c30d6e20a700870aeeb8fcc7992d8a351b8f11261e51eca8e179
                                                              • Opcode Fuzzy Hash: 7c27a79f67136dc7ccf727c914b9f283877fb73691f7add5845734f153e69c9d
                                                              • Instruction Fuzzy Hash: 2101F971904218BEDB18D798C81AFED7FF89B05301F00455AF152D6181E5B8A7048B70
                                                              APIs
                                                                • Part of subcall function 00787C0E: __getptd_noexit.LIBCMT ref: 00787C0E
                                                              • __getbuf.LIBCMT ref: 00788EFA
                                                              • __lseeki64.LIBCMT ref: 00788F6A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __getbuf__getptd_noexit__lseeki64
                                                              • String ID:
                                                              • API String ID: 3311320906-0
                                                              • Opcode ID: b9289c8cb29eea4b9eeab7f253cfea821a09f55ca0fb0211559511bde46f2570
                                                              • Instruction ID: cfcc20bd59dd460807f6c9c9cfe6c89a56302afcd51ee3438ad2786f37ae9837
                                                              • Opcode Fuzzy Hash: b9289c8cb29eea4b9eeab7f253cfea821a09f55ca0fb0211559511bde46f2570
                                                              • Instruction Fuzzy Hash: DC411171180A019FD368BF29C845A7A77A6AF44330F54861DF6AA8B2D1DB7CDC408B52
                                                              APIs
                                                              • IsThemeActive.UXTHEME ref: 00763A73
                                                                • Part of subcall function 00781405: __lock.LIBCMT ref: 0078140B
                                                                • Part of subcall function 00763ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00763AF3
                                                                • Part of subcall function 00763ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00763B08
                                                                • Part of subcall function 00763D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00763AA3,?), ref: 00763D45
                                                                • Part of subcall function 00763D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00763AA3,?), ref: 00763D57
                                                                • Part of subcall function 00763D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,00821148,00821130,?,?,?,?,00763AA3,?), ref: 00763DC8
                                                                • Part of subcall function 00763D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00763AA3,?), ref: 00763E48
                                                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00763AB3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
                                                              • String ID:
                                                              • API String ID: 924797094-0
                                                              • Opcode ID: abce33b641c242e6f1334dcc3a2fe7badb75b748f5b073ef5b1c9ba06785048d
                                                              • Instruction ID: 329fc49bcddba3dc2dfdc254d82c5d96b615e8f2e9e1ccf778a279bbd9d4796a
                                                              • Opcode Fuzzy Hash: abce33b641c242e6f1334dcc3a2fe7badb75b748f5b073ef5b1c9ba06785048d
                                                              • Instruction Fuzzy Hash: 1411C0B1904340DBC710EF65EC4990AFBE8FBA4350F10C91EF489872A1DB749652CF92
                                                              APIs
                                                              • ___lock_fhandle.LIBCMT ref: 0078EA29
                                                              • __close_nolock.LIBCMT ref: 0078EA42
                                                                • Part of subcall function 00787BDA: __getptd_noexit.LIBCMT ref: 00787BDA
                                                                • Part of subcall function 00787C0E: __getptd_noexit.LIBCMT ref: 00787C0E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                              • String ID:
                                                              • API String ID: 1046115767-0
                                                              • Opcode ID: c1e7bc678ed50be4b58602d1950fc35075d20a73a18d60a95d317938b2c2e63f
                                                              • Instruction ID: 975fbbcdbd8bd72ec427fc05b8579190ead626800c581d6f0c7c4227385de84d
                                                              • Opcode Fuzzy Hash: c1e7bc678ed50be4b58602d1950fc35075d20a73a18d60a95d317938b2c2e63f
                                                              • Instruction Fuzzy Hash: FC117072885610DAD71ABF68C8493687E617F81732F268350E4715F1E3CBBC8841DBA2
                                                              APIs
                                                                • Part of subcall function 0078395C: __FF_MSGBANNER.LIBCMT ref: 00783973
                                                                • Part of subcall function 0078395C: __NMSG_WRITE.LIBCMT ref: 0078397A
                                                                • Part of subcall function 0078395C: RtlAllocateHeap.NTDLL(00D20000,00000000,00000001,00000001,00000000,?,?,0077F507,?,0000000E), ref: 0078399F
                                                              • std::exception::exception.LIBCMT ref: 0077F51E
                                                              • __CxxThrowException@8.LIBCMT ref: 0077F533
                                                                • Part of subcall function 00786805: RaiseException.KERNEL32(?,?,0000000E,00816A30,?,?,?,0077F538,0000000E,00816A30,?,00000001), ref: 00786856
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                              • String ID:
                                                              • API String ID: 3902256705-0
                                                              • Opcode ID: bf84dd9df70c21e5f11f44fa7eb07b166a9666fd6a8bf42a4346dabd1bdf384f
                                                              • Instruction ID: 9b940294d94ed84de072d9af933978a949f10598c53b930aef32cb55f4e19d8f
                                                              • Opcode Fuzzy Hash: bf84dd9df70c21e5f11f44fa7eb07b166a9666fd6a8bf42a4346dabd1bdf384f
                                                              • Instruction Fuzzy Hash: 4BF0AF3114425EA7DB14BFA9DE059DE77ECAF04394F608036F90CD2181DBB89B9087E6
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __lock_file_memset
                                                              • String ID:
                                                              • API String ID: 26237723-0
                                                              • Opcode ID: 3b90ec3f18ddf1ea3f57d30c9edf7882c52c0db7e731547c5c9411e42b6c45fe
                                                              • Instruction ID: f741b71f965d55dad867284c0c666e32fa39f130d576abceb1a86807685dc890
                                                              • Opcode Fuzzy Hash: 3b90ec3f18ddf1ea3f57d30c9edf7882c52c0db7e731547c5c9411e42b6c45fe
                                                              • Instruction Fuzzy Hash: 30018471980209FBCF22BFA8CC0989E7B61FF40721F148129F82457161D7798B61DBA1
                                                              APIs
                                                                • Part of subcall function 00787C0E: __getptd_noexit.LIBCMT ref: 00787C0E
                                                              • __lock_file.LIBCMT ref: 00783629
                                                                • Part of subcall function 00784E1C: __lock.LIBCMT ref: 00784E3F
                                                              • __fclose_nolock.LIBCMT ref: 00783634
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                              • String ID:
                                                              • API String ID: 2800547568-0
                                                              • Opcode ID: 918dd32817591fbe938cbf0999ec5a102fb0030d43f33b0231cfbe16d91356ba
                                                              • Instruction ID: 29b8d44b94052a2b619c22ddd5733f5249ba391fff53f5e32bcea60772e7af6d
                                                              • Opcode Fuzzy Hash: 918dd32817591fbe938cbf0999ec5a102fb0030d43f33b0231cfbe16d91356ba
                                                              • Instruction Fuzzy Hash: 1BF0B471AC1205FADB117F7DC80A76E7AA06F40B35F258149E421EB2D1DB7C8B01DB56
                                                              APIs
                                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 00D67A8D
                                                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00D67AB1
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00D67AD3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102902206.0000000000D66000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D66000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_d66000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                              • String ID:
                                                              • API String ID: 2438371351-0
                                                              • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                              • Instruction ID: f92c47e21f4e96e54fc07768e041a66fe65e4519a5943465b1e3c2225ef86104
                                                              • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                              • Instruction Fuzzy Hash: 0912CE24A18658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                                                              APIs
                                                              • __flush.LIBCMT ref: 00782A0B
                                                                • Part of subcall function 00787C0E: __getptd_noexit.LIBCMT ref: 00787C0E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __flush__getptd_noexit
                                                              • String ID:
                                                              • API String ID: 4101623367-0
                                                              • Opcode ID: 604a52b038f9d89d146637e8f6a8a9ae492491e42f3dfb09f15d024a6db6c6d3
                                                              • Instruction ID: 1c1938972cb4bfdc14acec147052461cab039e5104c73e035d23e22d0dc7d0fe
                                                              • Opcode Fuzzy Hash: 604a52b038f9d89d146637e8f6a8a9ae492491e42f3dfb09f15d024a6db6c6d3
                                                              • Instruction Fuzzy Hash: A14109707807069FDF2CAEA9C88056E77A6AF44362F24C53DEC55D7242EB78ED428B41
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                              • Instruction ID: 8e17dcd270b6efe67529c1d7827dc1f3516a3faec47c9e64d310e5865bd92721
                                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                              • Instruction Fuzzy Hash: BC31A274B001059BDB28DF58C490A69FBA6FB49380B64C6E5E40DCB266DB35EDD1CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __getptd_noexit
                                                              • String ID:
                                                              • API String ID: 3074181302-0
                                                              • Opcode ID: 033bb54f4f156fb3b8b10d9589ad75cd0e2670690f1d7ced964abe27fa0f568b
                                                              • Instruction ID: a90024b03d3fd4ea7eee4860adc149529b4bb0a567be9e5712033f97a00b1d1b
                                                              • Opcode Fuzzy Hash: 033bb54f4f156fb3b8b10d9589ad75cd0e2670690f1d7ced964abe27fa0f568b
                                                              • Instruction Fuzzy Hash: C2216DB2984600DFE7267FA8C8497583AA1AF42336F264640E4714B1E2DBBCC844DBB1
                                                              APIs
                                                                • Part of subcall function 00764214: FreeLibrary.KERNEL32(00000000,?), ref: 00764247
                                                              • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,007639FE,?,00000001), ref: 007641DB
                                                                • Part of subcall function 00764291: FreeLibrary.KERNEL32(00000000), ref: 007642C4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Library$Free$Load
                                                              • String ID:
                                                              • API String ID: 2391024519-0
                                                              • Opcode ID: 3b1375d329234f3df08203312c11c624908a1828ae7c19174e4e7eead3035290
                                                              • Instruction ID: 98338ae515b7e3f2b34e649e28e3a6c7d17dfaf3d2238672d99652bf12a1b532
                                                              • Opcode Fuzzy Hash: 3b1375d329234f3df08203312c11c624908a1828ae7c19174e4e7eead3035290
                                                              • Instruction Fuzzy Hash: DA11A771600305EFDB14BB74DC1AF9E77A9AF40704F208429FD97A61D1DE789E409B60
                                                              APIs
                                                              • ___lock_fhandle.LIBCMT ref: 0078AFC0
                                                                • Part of subcall function 00787BDA: __getptd_noexit.LIBCMT ref: 00787BDA
                                                                • Part of subcall function 00787C0E: __getptd_noexit.LIBCMT ref: 00787C0E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __getptd_noexit$___lock_fhandle
                                                              • String ID:
                                                              • API String ID: 1144279405-0
                                                              • Opcode ID: c75cca31d09e1f5113158ccf63832b5e8a961fbb96632cf7fc04eedf9680d4de
                                                              • Instruction ID: ce6ca08fcdf525b64cfbcf58e3516dae299f438bb9012996991cf52dd43e2ac1
                                                              • Opcode Fuzzy Hash: c75cca31d09e1f5113158ccf63832b5e8a961fbb96632cf7fc04eedf9680d4de
                                                              • Instruction Fuzzy Hash: 1511BFB2884600EFD7167FA4C84A75D3A61AF41332F264240E4315F1E2D7BCCD41DBA2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 279f5f87aea4605f70f2d64a128fa314d82d263771f3b219d5efef33e318cff7
                                                              • Instruction ID: e55577118063b2bb279bcb77f7b8e4f8b7c54edb116d0aa1bc464e21ea31c69d
                                                              • Opcode Fuzzy Hash: 279f5f87aea4605f70f2d64a128fa314d82d263771f3b219d5efef33e318cff7
                                                              • Instruction Fuzzy Hash: 7E01367150010DEECF05EFA4C8958EEBB74AF21344F108166B966971A6EA349A4ADB60
                                                              APIs
                                                              • __lock_file.LIBCMT ref: 00782AED
                                                                • Part of subcall function 00787C0E: __getptd_noexit.LIBCMT ref: 00787C0E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __getptd_noexit__lock_file
                                                              • String ID:
                                                              • API String ID: 2597487223-0
                                                              • Opcode ID: 544f698a991a43e8d8ecc1a6c23a73780145deab0f1908eff0afe5dcc37a1559
                                                              • Instruction ID: d88cc00fd3382f89bc20af5f552aff8ea2e2da446d662f30a1ccc58dd0465d85
                                                              • Opcode Fuzzy Hash: 544f698a991a43e8d8ecc1a6c23a73780145deab0f1908eff0afe5dcc37a1559
                                                              • Instruction Fuzzy Hash: 48F06231580205FADF25BF648C0A79F3AA5BF00722F158455F8149B192D77C8A53DB52
                                                              APIs
                                                              • FreeLibrary.KERNEL32(?,?,?,?,?,007639FE,?,00000001), ref: 00764286
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 37cc8f4f13adfadc707c7eae24be1668184a8992fe9f1d5aa99cac1df521e3cd
                                                              • Instruction ID: 7c2a62014d56e38c3251f39e84e8953355546766222ab0127d44642f996da342
                                                              • Opcode Fuzzy Hash: 37cc8f4f13adfadc707c7eae24be1668184a8992fe9f1d5aa99cac1df521e3cd
                                                              • Instruction Fuzzy Hash: 07F039B1505702DFCB349F64D8A4816BBE4BF043253348A3EF9D786610C73A9844DF50
                                                              APIs
                                                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007640C6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: LongNamePath
                                                              • String ID:
                                                              • API String ID: 82841172-0
                                                              • Opcode ID: 5ca95d2f6a00143242c18fe95774397a6e0910525dbfc74639f876fff0395351
                                                              • Instruction ID: dfd14363e209f1b1dd0c1d7390b14f659660a24a826f6fccc99b252e2cda7ad1
                                                              • Opcode Fuzzy Hash: 5ca95d2f6a00143242c18fe95774397a6e0910525dbfc74639f876fff0395351
                                                              • Instruction Fuzzy Hash: 20E0CD365001245BC711A654CC46FEA779DDF8C690F054075F905E7244D9789D818690
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __fread_nolock
                                                              • String ID:
                                                              • API String ID: 2638373210-0
                                                              • Opcode ID: 3cca4198d2bc13ecada8dba30311a83a0df564d107d747b73ddd6f796e1577fd
                                                              • Instruction ID: 595ec8954e6166986abd188cc19cf7e46d06ad2386f6d5ff41ee12a6c376955a
                                                              • Opcode Fuzzy Hash: 3cca4198d2bc13ecada8dba30311a83a0df564d107d747b73ddd6f796e1577fd
                                                              • Instruction Fuzzy Hash: C2E0D8B0204B409FD7348B24D800BE373E0EB46305F00091DF29BC3242EB637841C759
                                                              APIs
                                                              • Sleep.KERNELBASE(000001F4), ref: 00D68271
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102902206.0000000000D66000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D66000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_d66000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Sleep
                                                              • String ID:
                                                              • API String ID: 3472027048-0
                                                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                              • Instruction ID: d6ce1789da9f871f828e7ea4c4aeee2c0b0f81d460ac8e11defed1449855cffb
                                                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                              • Instruction Fuzzy Hash: D4E0BF7494010D9FDB40EFA8D54969E7BB4EF04701F100261FD0192280DA3099509A62
                                                              APIs
                                                                • Part of subcall function 0077B34E: GetWindowLongW.USER32(?,000000EB), ref: 0077B35F
                                                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?,?), ref: 007CF87D
                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007CF8DC
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 007CF919
                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007CF940
                                                              • SendMessageW.USER32 ref: 007CF966
                                                              • _wcsncpy.LIBCMT ref: 007CF9D2
                                                              • GetKeyState.USER32(00000011), ref: 007CF9F3
                                                              • GetKeyState.USER32(00000009), ref: 007CFA00
                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007CFA16
                                                              • GetKeyState.USER32(00000010), ref: 007CFA20
                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007CFA4F
                                                              • SendMessageW.USER32 ref: 007CFA72
                                                              • SendMessageW.USER32(?,00001030,?,007CE059), ref: 007CFB6F
                                                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?,?), ref: 007CFB85
                                                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 007CFB96
                                                              • SetCapture.USER32(?), ref: 007CFB9F
                                                              • ClientToScreen.USER32(?,?), ref: 007CFC03
                                                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 007CFC0F
                                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?), ref: 007CFC29
                                                              • ReleaseCapture.USER32 ref: 007CFC34
                                                              • GetCursorPos.USER32(?), ref: 007CFC69
                                                              • ScreenToClient.USER32(?,?), ref: 007CFC76
                                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 007CFCD8
                                                              • SendMessageW.USER32 ref: 007CFD02
                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 007CFD41
                                                              • SendMessageW.USER32 ref: 007CFD6C
                                                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 007CFD84
                                                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 007CFD8F
                                                              • GetCursorPos.USER32(?), ref: 007CFDB0
                                                              • ScreenToClient.USER32(?,?), ref: 007CFDBD
                                                              • GetParent.USER32(?), ref: 007CFDD9
                                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 007CFE3F
                                                              • SendMessageW.USER32 ref: 007CFE6F
                                                              • ClientToScreen.USER32(?,?), ref: 007CFEC5
                                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 007CFEF1
                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 007CFF19
                                                              • SendMessageW.USER32 ref: 007CFF3C
                                                              • ClientToScreen.USER32(?,?), ref: 007CFF86
                                                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 007CFFB6
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 007D004B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$ClientScreen$Image$CursorDragList_LongStateWindow$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                              • String ID: @GUI_DRAGID$F
                                                              • API String ID: 2516578528-4164748364
                                                              • Opcode ID: dc6373a376c96750b1d465338dc18fa5c90c5f578603dc840d0999e964f9bdb8
                                                              • Instruction ID: b4b0a720864f54dc48284c398ba237d83e27d52ad1590e5b817db0673bfc7ad4
                                                              • Opcode Fuzzy Hash: dc6373a376c96750b1d465338dc18fa5c90c5f578603dc840d0999e964f9bdb8
                                                              • Instruction Fuzzy Hash: 18329870604244EFDB20CF64C888FAABBEAFB49354F14462EFA95872A1C739DC55CB51
                                                              APIs
                                                              • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 007CB1CD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: %d/%02d/%02d
                                                              • API String ID: 3850602802-328681919
                                                              • Opcode ID: e43be3aedc992db93405d9635998e69762307f33022465bc5824d27934651dce
                                                              • Instruction ID: 236b23a24d0a9e99f9eb23a4127744e6e28c500c72d5abc16ead6755afd59904
                                                              • Opcode Fuzzy Hash: e43be3aedc992db93405d9635998e69762307f33022465bc5824d27934651dce
                                                              • Instruction Fuzzy Hash: 3E12BF71600248ABEB258F64CC4AFAA7BB8FF49714F14811DF91ADA2D1DB788941CB61
                                                              APIs
                                                              • GetForegroundWindow.USER32(00000000,00000000), ref: 0077EB4A
                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007D3AEA
                                                              • IsIconic.USER32(000000FF), ref: 007D3AF3
                                                              • ShowWindow.USER32(000000FF,00000009), ref: 007D3B00
                                                              • SetForegroundWindow.USER32(000000FF), ref: 007D3B0A
                                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007D3B20
                                                              • GetCurrentThreadId.KERNEL32 ref: 007D3B27
                                                              • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 007D3B33
                                                              • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 007D3B44
                                                              • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 007D3B4C
                                                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 007D3B54
                                                              • SetForegroundWindow.USER32(000000FF), ref: 007D3B57
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 007D3B6C
                                                              • keybd_event.USER32(00000012,00000000), ref: 007D3B77
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 007D3B81
                                                              • keybd_event.USER32(00000012,00000000), ref: 007D3B86
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 007D3B8F
                                                              • keybd_event.USER32(00000012,00000000), ref: 007D3B94
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 007D3B9E
                                                              • keybd_event.USER32(00000012,00000000), ref: 007D3BA3
                                                              • SetForegroundWindow.USER32(000000FF), ref: 007D3BA6
                                                              • AttachThreadInput.USER32(000000FF,?,00000000), ref: 007D3BCD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                              • String ID: Shell_TrayWnd
                                                              • API String ID: 4125248594-2988720461
                                                              • Opcode ID: 884962779a7e5d2a520beb3069f9d09e5ea6edbb47395981e9746d4d412c7a10
                                                              • Instruction ID: 15e954193917d4ed596bc0d37edd0e84aca391d0dc82af32831fda293cebb82b
                                                              • Opcode Fuzzy Hash: 884962779a7e5d2a520beb3069f9d09e5ea6edbb47395981e9746d4d412c7a10
                                                              • Instruction Fuzzy Hash: 523196B1A403587FEB305B658C89F7F7E7CEB48B50F108016FA05EE2D0D6B95D109AA5
                                                              APIs
                                                                • Part of subcall function 0079B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0079B180
                                                                • Part of subcall function 0079B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0079B1AD
                                                                • Part of subcall function 0079B134: GetLastError.KERNEL32 ref: 0079B1BA
                                                              • _memset.LIBCMT ref: 0079AD08
                                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 0079AD5A
                                                              • CloseHandle.KERNEL32(?), ref: 0079AD6B
                                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 0079AD82
                                                              • GetProcessWindowStation.USER32 ref: 0079AD9B
                                                              • SetProcessWindowStation.USER32(00000000), ref: 0079ADA5
                                                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0079ADBF
                                                                • Part of subcall function 0079AB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0079ACC0), ref: 0079AB99
                                                                • Part of subcall function 0079AB84: CloseHandle.KERNEL32(?,?,0079ACC0), ref: 0079ABAB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                              • String ID: $default$winsta0
                                                              • API String ID: 2063423040-1027155976
                                                              • Opcode ID: cfac3bc8ff719d2761ed9c051a914e82f45795fe5b13da0d771c6483bccd740f
                                                              • Instruction ID: 947b7eafa99f5b109b1a2b0f7407f33eef0b6d9853536aab0516010496cffb7f
                                                              • Opcode Fuzzy Hash: cfac3bc8ff719d2761ed9c051a914e82f45795fe5b13da0d771c6483bccd740f
                                                              • Instruction Fuzzy Hash: 26818CB1902249FFDF119FA4EC8AAEE7B79FF08304F048119F814A6161D7398E54DBA1
                                                              APIs
                                                                • Part of subcall function 007A6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007A5FA6,?), ref: 007A6ED8
                                                                • Part of subcall function 007A6EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007A5FA6,?), ref: 007A6EF1
                                                                • Part of subcall function 007A725E: __wsplitpath.LIBCMT ref: 007A727B
                                                                • Part of subcall function 007A725E: __wsplitpath.LIBCMT ref: 007A728E
                                                                • Part of subcall function 007A72CB: GetFileAttributesW.KERNEL32(?,007A6019), ref: 007A72CC
                                                              • _wcscat.LIBCMT ref: 007A6149
                                                              • _wcscat.LIBCMT ref: 007A6167
                                                              • __wsplitpath.LIBCMT ref: 007A618E
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 007A61A4
                                                              • _wcscpy.LIBCMT ref: 007A6209
                                                              • _wcscat.LIBCMT ref: 007A621C
                                                              • _wcscat.LIBCMT ref: 007A622F
                                                              • lstrcmpiW.KERNEL32(?,?), ref: 007A625D
                                                              • DeleteFileW.KERNEL32(?), ref: 007A626E
                                                              • MoveFileW.KERNEL32(?,?), ref: 007A6289
                                                              • MoveFileW.KERNEL32(?,?), ref: 007A6298
                                                              • CopyFileW.KERNEL32(?,?,00000000), ref: 007A62AD
                                                              • DeleteFileW.KERNEL32(?), ref: 007A62BE
                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 007A62E1
                                                              • FindClose.KERNEL32(00000000), ref: 007A62FD
                                                              • FindClose.KERNEL32(00000000), ref: 007A630B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                                              • String ID: \*.*
                                                              • API String ID: 1917200108-1173974218
                                                              • Opcode ID: 386f87c752870e3655d59cff534555fb73a0730b483afb62488835effe6351b3
                                                              • Instruction ID: 8fe69d8a8b2cd1d325ad53243e747b4950408490a755b9452787ed45da98c531
                                                              • Opcode Fuzzy Hash: 386f87c752870e3655d59cff534555fb73a0730b483afb62488835effe6351b3
                                                              • Instruction Fuzzy Hash: FF51217280915CAACB21EB91CC48EEF77BCBF45300F0941E6E645E3141DE7A9B498FA4
                                                              APIs
                                                              • OpenClipboard.USER32(007FDC00), ref: 007B6B36
                                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 007B6B44
                                                              • GetClipboardData.USER32(0000000D), ref: 007B6B4C
                                                              • CloseClipboard.USER32 ref: 007B6B58
                                                              • GlobalLock.KERNEL32(00000000), ref: 007B6B74
                                                              • CloseClipboard.USER32 ref: 007B6B7E
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 007B6B93
                                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 007B6BA0
                                                              • GetClipboardData.USER32(00000001), ref: 007B6BA8
                                                              • GlobalLock.KERNEL32(00000000), ref: 007B6BB5
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 007B6BE9
                                                              • CloseClipboard.USER32 ref: 007B6CF6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                              • String ID:
                                                              • API String ID: 3222323430-0
                                                              • Opcode ID: 3f3089e739394945b271bba6eb137be8a3a1a22585dda1c8ba8b86a372324be6
                                                              • Instruction ID: 3b1cd2c93927cbb1c3d9a47241efcdadc327c31d337627a750bb30d9b5a51951
                                                              • Opcode Fuzzy Hash: 3f3089e739394945b271bba6eb137be8a3a1a22585dda1c8ba8b86a372324be6
                                                              • Instruction Fuzzy Hash: 9551B471200241ABD311AF64CD9AFBF77B8AF58B00F104529FA86DA1D1DF7CEC058A66
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 007AF62B
                                                              • FindClose.KERNEL32(00000000), ref: 007AF67F
                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007AF6A4
                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007AF6BB
                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 007AF6E2
                                                              • __swprintf.LIBCMT ref: 007AF72E
                                                              • __swprintf.LIBCMT ref: 007AF767
                                                              • __swprintf.LIBCMT ref: 007AF7BB
                                                                • Part of subcall function 0078172B: __woutput_l.LIBCMT ref: 00781784
                                                              • __swprintf.LIBCMT ref: 007AF809
                                                              • __swprintf.LIBCMT ref: 007AF858
                                                              • __swprintf.LIBCMT ref: 007AF8A7
                                                              • __swprintf.LIBCMT ref: 007AF8F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                              • API String ID: 835046349-2428617273
                                                              • Opcode ID: 30c66bb5209b76167f995dfd352e4d000e376b28e3d397f844176671c1dc9a89
                                                              • Instruction ID: 21d6a534d902239822cf160f555a2e82b4572786f4a68424a52e5d8c7d0521cb
                                                              • Opcode Fuzzy Hash: 30c66bb5209b76167f995dfd352e4d000e376b28e3d397f844176671c1dc9a89
                                                              • Instruction Fuzzy Hash: 12A10FB1504344EBC711EB94C889DAFB7ECEF98700F44492DF696C6152EB38D949CB62
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 007B1B50
                                                              • _wcscmp.LIBCMT ref: 007B1B65
                                                              • _wcscmp.LIBCMT ref: 007B1B7C
                                                              • GetFileAttributesW.KERNEL32(?), ref: 007B1B8E
                                                              • SetFileAttributesW.KERNEL32(?,?), ref: 007B1BA8
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 007B1BC0
                                                              • FindClose.KERNEL32(00000000), ref: 007B1BCB
                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 007B1BE7
                                                              • _wcscmp.LIBCMT ref: 007B1C0E
                                                              • _wcscmp.LIBCMT ref: 007B1C25
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007B1C37
                                                              • SetCurrentDirectoryW.KERNEL32(008139FC), ref: 007B1C55
                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 007B1C5F
                                                              • FindClose.KERNEL32(00000000), ref: 007B1C6C
                                                              • FindClose.KERNEL32(00000000), ref: 007B1C7C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                              • String ID: *.*
                                                              • API String ID: 1803514871-438819550
                                                              • Opcode ID: 7ec937c03e19d6e7cef029d01e2f97a789151d52190f7606a63621dbc2a36540
                                                              • Instruction ID: 426851fdaaef57b85adfc878bce825d9d71843932b7ef0f5c7706e838b59c6a0
                                                              • Opcode Fuzzy Hash: 7ec937c03e19d6e7cef029d01e2f97a789151d52190f7606a63621dbc2a36540
                                                              • Instruction Fuzzy Hash: DB31D671541259AFCF20ABA0DC59BEE7BACAF09310F904155E911D3190EB78DE858B64
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 007B1CAB
                                                              • _wcscmp.LIBCMT ref: 007B1CC0
                                                              • _wcscmp.LIBCMT ref: 007B1CD7
                                                                • Part of subcall function 007A6BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007A6BEF
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 007B1D06
                                                              • FindClose.KERNEL32(00000000), ref: 007B1D11
                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 007B1D2D
                                                              • _wcscmp.LIBCMT ref: 007B1D54
                                                              • _wcscmp.LIBCMT ref: 007B1D6B
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007B1D7D
                                                              • SetCurrentDirectoryW.KERNEL32(008139FC), ref: 007B1D9B
                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 007B1DA5
                                                              • FindClose.KERNEL32(00000000), ref: 007B1DB2
                                                              • FindClose.KERNEL32(00000000), ref: 007B1DC2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                              • String ID: *.*
                                                              • API String ID: 1824444939-438819550
                                                              • Opcode ID: b2c9058d3aeb6d0c2c30f60413903d4e7eb8450406075a9c934782f494085aee
                                                              • Instruction ID: f4abf1ca862df5a80c3628381fb4dd8845e5e37adcdf4863ffd8744042e941ab
                                                              • Opcode Fuzzy Hash: b2c9058d3aeb6d0c2c30f60413903d4e7eb8450406075a9c934782f494085aee
                                                              • Instruction Fuzzy Hash: 5B31163160121DAACF20EBA0DC59BDE3BADAF05320F904551F910E6190DB3CCE95CB64
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _memset
                                                              • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
                                                              • API String ID: 2102423945-2023335898
                                                              • Opcode ID: a85664a7d20f966e70326f42b2066973da293c3e9cf82282c4024bea842fa6a8
                                                              • Instruction ID: 71e75a4e0272140bd207614982bf56abdf08a525fb2719d6609ad5f36a3540cd
                                                              • Opcode Fuzzy Hash: a85664a7d20f966e70326f42b2066973da293c3e9cf82282c4024bea842fa6a8
                                                              • Instruction Fuzzy Hash: E182A271D04219DBCF28CF98C8807ADB7B1FF48354F25816AD85AAB351E7789D85CB90
                                                              APIs
                                                              • GetLocalTime.KERNEL32(?), ref: 007B09DF
                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 007B09EF
                                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 007B09FB
                                                              • __wsplitpath.LIBCMT ref: 007B0A59
                                                              • _wcscat.LIBCMT ref: 007B0A71
                                                              • _wcscat.LIBCMT ref: 007B0A83
                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 007B0A98
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007B0AAC
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007B0ADE
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007B0AFF
                                                              • _wcscpy.LIBCMT ref: 007B0B0B
                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 007B0B4A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                              • String ID: *.*
                                                              • API String ID: 3566783562-438819550
                                                              • Opcode ID: 8d0568da7eb3712c1cdf7d9b521c28d81100d29726faf88c06784346cf95333d
                                                              • Instruction ID: e35310e69a9d7f217658d0026bfd6d8c69539c75ba5bc823fd170f965bc34dc7
                                                              • Opcode Fuzzy Hash: 8d0568da7eb3712c1cdf7d9b521c28d81100d29726faf88c06784346cf95333d
                                                              • Instruction Fuzzy Hash: CE613CB25043459FD710EF60C889A9FB3E8FF89310F048919F999D7251DB39E945CB92
                                                              APIs
                                                                • Part of subcall function 0079ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0079ABD7
                                                                • Part of subcall function 0079ABBB: GetLastError.KERNEL32(?,0079A69F,?,?,?), ref: 0079ABE1
                                                                • Part of subcall function 0079ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0079A69F,?,?,?), ref: 0079ABF0
                                                                • Part of subcall function 0079ABBB: HeapAlloc.KERNEL32(00000000,?,0079A69F,?,?,?), ref: 0079ABF7
                                                                • Part of subcall function 0079ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0079AC0E
                                                                • Part of subcall function 0079AC56: GetProcessHeap.KERNEL32(00000008,0079A6B5,00000000,00000000,?,0079A6B5,?), ref: 0079AC62
                                                                • Part of subcall function 0079AC56: HeapAlloc.KERNEL32(00000000,?,0079A6B5,?), ref: 0079AC69
                                                                • Part of subcall function 0079AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0079A6B5,?), ref: 0079AC7A
                                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0079A6D0
                                                              • _memset.LIBCMT ref: 0079A6E5
                                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0079A704
                                                              • GetLengthSid.ADVAPI32(?), ref: 0079A715
                                                              • GetAce.ADVAPI32(?,00000000,?), ref: 0079A752
                                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0079A76E
                                                              • GetLengthSid.ADVAPI32(?), ref: 0079A78B
                                                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0079A79A
                                                              • HeapAlloc.KERNEL32(00000000), ref: 0079A7A1
                                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0079A7C2
                                                              • CopySid.ADVAPI32(00000000), ref: 0079A7C9
                                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0079A7FA
                                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0079A820
                                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0079A834
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                              • String ID:
                                                              • API String ID: 3996160137-0
                                                              • Opcode ID: 463de86a2dd5a72357f82d2cae4d6efc24894b34fe1c2e5f9f31f1fc5cc45809
                                                              • Instruction ID: faab68cffc1ab60296057c0c62163af93b1bf004d165a9f0a413a72df32bdc92
                                                              • Opcode Fuzzy Hash: 463de86a2dd5a72357f82d2cae4d6efc24894b34fe1c2e5f9f31f1fc5cc45809
                                                              • Instruction Fuzzy Hash: 78513B71901249BFDF11DF95EC85EEEBBB9FF08300F048129E911AA291D7399E05CBA5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$mmmmmm
                                                              • API String ID: 0-574317713
                                                              • Opcode ID: ecfe8041c107d46cf916f32e144a794dd49656efb3e1aa5875e45e6e1bc9ba4e
                                                              • Instruction ID: 502c68202fa81b42c434f7cd5b88436b8c09b21104cc49c93b03c605ae730eb4
                                                              • Opcode Fuzzy Hash: ecfe8041c107d46cf916f32e144a794dd49656efb3e1aa5875e45e6e1bc9ba4e
                                                              • Instruction Fuzzy Hash: 8272A271E05259CBDF18CF59C8447AEB7B5FF48350F14816AE906EB281EB789E81CB90
                                                              APIs
                                                                • Part of subcall function 007A6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007A5FA6,?), ref: 007A6ED8
                                                                • Part of subcall function 007A72CB: GetFileAttributesW.KERNEL32(?,007A6019), ref: 007A72CC
                                                              • _wcscat.LIBCMT ref: 007A6441
                                                              • __wsplitpath.LIBCMT ref: 007A645F
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 007A6474
                                                              • _wcscpy.LIBCMT ref: 007A64A3
                                                              • _wcscat.LIBCMT ref: 007A64B8
                                                              • _wcscat.LIBCMT ref: 007A64CA
                                                              • DeleteFileW.KERNEL32(?), ref: 007A64DA
                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 007A64EB
                                                              • FindClose.KERNEL32(00000000), ref: 007A6506
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                                              • String ID: \*.*
                                                              • API String ID: 2643075503-1173974218
                                                              • Opcode ID: 21fcad6e8444309d4a55321d5fa72d543d8c3b4b805948ae9db348e0963f832a
                                                              • Instruction ID: 1fa10411b792b76e56e6fb012089d5845ccea18dbac08ff1cb16a831ec529f9c
                                                              • Opcode Fuzzy Hash: 21fcad6e8444309d4a55321d5fa72d543d8c3b4b805948ae9db348e0963f832a
                                                              • Instruction Fuzzy Hash: F2319AB24483849EC731EBA488899DB77DCAF9A310F444A1EF6D4C3141EA39D50D87B7
                                                              APIs
                                                                • Part of subcall function 007C3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C2BB5,?,?), ref: 007C3C1D
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C328E
                                                                • Part of subcall function 0076936C: __swprintf.LIBCMT ref: 007693AB
                                                                • Part of subcall function 0076936C: __itow.LIBCMT ref: 007693DF
                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 007C332D
                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 007C33C5
                                                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 007C3604
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 007C3611
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                              • String ID:
                                                              • API String ID: 1240663315-0
                                                              • Opcode ID: b5fefb6d2754066b24262342a13e0762532306f70cb3123b8ef8bd7f3714a810
                                                              • Instruction ID: d0df05dc099a2ec40abfe8ebe5e08ddc92e59e524f828d64c6e893a2451ca5ed
                                                              • Opcode Fuzzy Hash: b5fefb6d2754066b24262342a13e0762532306f70cb3123b8ef8bd7f3714a810
                                                              • Instruction Fuzzy Hash: 88E14A71604210EFCB15DF29C995E2ABBE8EF89314B04C56DF84ADB261DB38ED05CB52
                                                              APIs
                                                              • GetKeyboardState.USER32(?), ref: 007A2B5F
                                                              • GetAsyncKeyState.USER32(000000A0), ref: 007A2BE0
                                                              • GetKeyState.USER32(000000A0), ref: 007A2BFB
                                                              • GetAsyncKeyState.USER32(000000A1), ref: 007A2C15
                                                              • GetKeyState.USER32(000000A1), ref: 007A2C2A
                                                              • GetAsyncKeyState.USER32(00000011), ref: 007A2C42
                                                              • GetKeyState.USER32(00000011), ref: 007A2C54
                                                              • GetAsyncKeyState.USER32(00000012), ref: 007A2C6C
                                                              • GetKeyState.USER32(00000012), ref: 007A2C7E
                                                              • GetAsyncKeyState.USER32(0000005B), ref: 007A2C96
                                                              • GetKeyState.USER32(0000005B), ref: 007A2CA8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: State$Async$Keyboard
                                                              • String ID:
                                                              • API String ID: 541375521-0
                                                              • Opcode ID: a1fda4c626593f94a8b8169fe4b826cb3f180a2a68a5fb270c5adecd1edbf16d
                                                              • Instruction ID: a492fefa4d4b40c56a47160f91a75cbedb89c464b8ccf251921dbbac71d0f453
                                                              • Opcode Fuzzy Hash: a1fda4c626593f94a8b8169fe4b826cb3f180a2a68a5fb270c5adecd1edbf16d
                                                              • Instruction Fuzzy Hash: 904109705047C96EFF359B6888443AABEA06F93314F048249D9C65A2C3EB9C9DC5C7B6
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                              • String ID:
                                                              • API String ID: 1737998785-0
                                                              • Opcode ID: 39276c9a69c69f8337ef9395604fb7e370fbee84af49ebb1b3aa85031c9f2064
                                                              • Instruction ID: 08532d3c28e33879a1b1a80c3531676d1826d67a36bcf50e8a6ee16fcc363e1d
                                                              • Opcode Fuzzy Hash: 39276c9a69c69f8337ef9395604fb7e370fbee84af49ebb1b3aa85031c9f2064
                                                              • Instruction Fuzzy Hash: EA216832301110AFDF21AF64DC89B6D77A8FF58750F04C019FA0A9B2A1DB3CAC018B98
                                                              APIs
                                                                • Part of subcall function 00799ABF: CLSIDFromProgID.OLE32 ref: 00799ADC
                                                                • Part of subcall function 00799ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00799AF7
                                                                • Part of subcall function 00799ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00799B05
                                                                • Part of subcall function 00799ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00799B15
                                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 007BC235
                                                              • _memset.LIBCMT ref: 007BC242
                                                              • _memset.LIBCMT ref: 007BC360
                                                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 007BC38C
                                                              • CoTaskMemFree.OLE32(?), ref: 007BC397
                                                              Strings
                                                              • NULL Pointer assignment, xrefs: 007BC3E5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                              • String ID: NULL Pointer assignment
                                                              • API String ID: 1300414916-2785691316
                                                              • Opcode ID: cb4dd553cbc6a86b80a763da629037ea2f1e3088192f7723d99da4bb83e28dab
                                                              • Instruction ID: c0a192be1275a698d8d447c983501cb350ee18e03c1a550968655411104222b4
                                                              • Opcode Fuzzy Hash: cb4dd553cbc6a86b80a763da629037ea2f1e3088192f7723d99da4bb83e28dab
                                                              • Instruction Fuzzy Hash: 19912871D00218EBDB11DF94DC95EEEBBB8EF08710F10816AF919A7281DB745A45CFA0
                                                              APIs
                                                                • Part of subcall function 0079B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0079B180
                                                                • Part of subcall function 0079B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0079B1AD
                                                                • Part of subcall function 0079B134: GetLastError.KERNEL32 ref: 0079B1BA
                                                              • ExitWindowsEx.USER32(?,00000000), ref: 007A7A0F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                              • String ID: $@$SeShutdownPrivilege
                                                              • API String ID: 2234035333-194228
                                                              • Opcode ID: 3b6eddfcb28e88b1c4ce76e8cd4f5263bdecb0c7f12e54099acb0dc130b43386
                                                              • Instruction ID: 016b6cea23c9fead934510deb462fb7ca53bdced087aa81c8cd2208fc9f85313
                                                              • Opcode Fuzzy Hash: 3b6eddfcb28e88b1c4ce76e8cd4f5263bdecb0c7f12e54099acb0dc130b43386
                                                              • Instruction Fuzzy Hash: 0E01F775759211BEFB3C176C9C8BBBF33589B46340F148624B913E60D2D96C5E00C1A4
                                                              APIs
                                                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 007B8CA8
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 007B8CB7
                                                              • bind.WSOCK32(00000000,?,00000010), ref: 007B8CD3
                                                              • listen.WSOCK32(00000000,00000005), ref: 007B8CE2
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 007B8CFC
                                                              • closesocket.WSOCK32(00000000,00000000), ref: 007B8D10
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$bindclosesocketlistensocket
                                                              • String ID:
                                                              • API String ID: 1279440585-0
                                                              • Opcode ID: d072d846fb7053bf5ea029bb9d47029db1e3b134f929c50e6102769300e8f6d4
                                                              • Instruction ID: 8b50d3c860d115e5c1e75475e5e0515eaedf07be7bb571b2261625c68657da76
                                                              • Opcode Fuzzy Hash: d072d846fb7053bf5ea029bb9d47029db1e3b134f929c50e6102769300e8f6d4
                                                              • Instruction Fuzzy Hash: 9C21B671600200DFCB21EF64C999BAE77E9EF49314F108159F916AB3D2CB389D41CB61
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 007A6554
                                                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 007A6564
                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 007A6583
                                                              • __wsplitpath.LIBCMT ref: 007A65A7
                                                              • _wcscat.LIBCMT ref: 007A65BA
                                                              • CloseHandle.KERNEL32(00000000,?,00000000), ref: 007A65F9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                                              • String ID:
                                                              • API String ID: 1605983538-0
                                                              • Opcode ID: 86bb316add57e4c521dbe00ecdcb2056ba5670ecfc2179dd712ca400ea4de0c4
                                                              • Instruction ID: caa7e5f7406829acc2cbbce499a2cbeb58a34009e0aa62ab966eb94d0e709c52
                                                              • Opcode Fuzzy Hash: 86bb316add57e4c521dbe00ecdcb2056ba5670ecfc2179dd712ca400ea4de0c4
                                                              • Instruction Fuzzy Hash: 4F216571D00258EBDB20ABA4CC88BDEB7BCAB49300F5445A5E505E7141E7799F95CB60
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ERCP$VUUU$VUUU$VUUU$VUUU$mmmmmm
                                                              • API String ID: 0-856741556
                                                              • Opcode ID: 40eb8d6b934c14f6e5cca19d823776e5bc07dcb5c6244918ec4eebc4b58f7984
                                                              • Instruction ID: e6d5221c1f84b8b22a22e359ef69f05bcdd0f0b3b291b429e07b3470a670a365
                                                              • Opcode Fuzzy Hash: 40eb8d6b934c14f6e5cca19d823776e5bc07dcb5c6244918ec4eebc4b58f7984
                                                              • Instruction Fuzzy Hash: 4C92BF75E0125ACBDF24CF59C8407EEB7B1BB58314F2481AADD16AB280E7399D81CF91
                                                              APIs
                                                                • Part of subcall function 007BA82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 007BA84E
                                                              • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 007B9296
                                                              • WSAGetLastError.WSOCK32(00000000,00000000), ref: 007B92B9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastinet_addrsocket
                                                              • String ID:
                                                              • API String ID: 4170576061-0
                                                              • Opcode ID: b0309955a4ea5b24fe8859dd61fb874bcfa37eed9a42879488a0430d40908dcc
                                                              • Instruction ID: 5c087795101463ccce47746b7fb2e9fb2679d578aec288c840c1ddaef2d020ac
                                                              • Opcode Fuzzy Hash: b0309955a4ea5b24fe8859dd61fb874bcfa37eed9a42879488a0430d40908dcc
                                                              • Instruction Fuzzy Hash: 6141B570600100EFDF11AB68C885EBE77EDEF48764F148548FA5AAB392DA789D018B91
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 007AEB8A
                                                              • _wcscmp.LIBCMT ref: 007AEBBA
                                                              • _wcscmp.LIBCMT ref: 007AEBCF
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 007AEBE0
                                                              • FindClose.KERNEL32(00000000,00000001,00000000), ref: 007AEC0E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Find$File_wcscmp$CloseFirstNext
                                                              • String ID:
                                                              • API String ID: 2387731787-0
                                                              • Opcode ID: e3cf4ec691bc497dccd2f2ad36b3175df5b6b84c82d96c4df6dd9ae96307b976
                                                              • Instruction ID: 249fd636d790b6241da09d4518656317255eb6df60cdcf803dd78fe676d9ac74
                                                              • Opcode Fuzzy Hash: e3cf4ec691bc497dccd2f2ad36b3175df5b6b84c82d96c4df6dd9ae96307b976
                                                              • Instruction Fuzzy Hash: 0B41B075600301DFCB18DF28C495E99B7E8FF8A324F10865DE95A8B3A1DB39AD41CB61
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                              • String ID:
                                                              • API String ID: 292994002-0
                                                              • Opcode ID: b95bbb8331d4b60e44edf10ddfbd31e1d45153bf4ba6913fd293c39614a95558
                                                              • Instruction ID: f8a4a593a87c0ed26ee3d21a14b9e092f62bf0916a23d827aad35b04ae3c488e
                                                              • Opcode Fuzzy Hash: b95bbb8331d4b60e44edf10ddfbd31e1d45153bf4ba6913fd293c39614a95558
                                                              • Instruction Fuzzy Hash: 7D11BE31301518AFE7212F26DC88F6E77D8EF94360B08842DE80ADB241CF789D0286A6
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,0077E014,75920AE0,0077DEF1,007FDC38,?,?), ref: 0077E02C
                                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0077E03E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: GetNativeSystemInfo$kernel32.dll
                                                              • API String ID: 2574300362-192647395
                                                              • Opcode ID: 66d0c4ef0645d0f3f3690f05120ea67a460267b6dc3e2800a3c273e4c5b32db9
                                                              • Instruction ID: 25ed7fe391959a78b0b5176092827f120ca8ec051514c2ed4e913d4d35bb92e4
                                                              • Opcode Fuzzy Hash: 66d0c4ef0645d0f3f3690f05120ea67a460267b6dc3e2800a3c273e4c5b32db9
                                                              • Instruction Fuzzy Hash: 6AD05E305007129ECB314B64E84865276E9EF0A310F29C459A499D2250D6BCC880C754
                                                              APIs
                                                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007A13DC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: lstrlen
                                                              • String ID: ($|
                                                              • API String ID: 1659193697-1631851259
                                                              • Opcode ID: d39fef05587f6e46f5048b83a1d04866cdd100442b1633a1d8d7b815f144715c
                                                              • Instruction ID: 71dd9ce89e1a621bcc266052e9235cc1d98c57c802788ee38553c2af707f88b8
                                                              • Opcode Fuzzy Hash: d39fef05587f6e46f5048b83a1d04866cdd100442b1633a1d8d7b815f144715c
                                                              • Instruction Fuzzy Hash: D3322575A006059FDB28CF69C480A6AB7F0FF88320F51C56EE59ADB3A1E774E941CB44
                                                              APIs
                                                                • Part of subcall function 0077B34E: GetWindowLongW.USER32(?,000000EB), ref: 0077B35F
                                                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 0077B22F
                                                                • Part of subcall function 0077B55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 0077B5A5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Proc$LongWindow
                                                              • String ID:
                                                              • API String ID: 2749884682-0
                                                              • Opcode ID: 4476965d458eb8d431046853182c7140b6e1f34c448644eceab169b67a0044b0
                                                              • Instruction ID: f8d663cab5cf484061908a826ff16e533c6ee76a73b9df8085287f8b6c5d7e5b
                                                              • Opcode Fuzzy Hash: 4476965d458eb8d431046853182c7140b6e1f34c448644eceab169b67a0044b0
                                                              • Instruction Fuzzy Hash: CCA12570115109FADF397A295C8DFBF2A6DFB963C4B54C11EF40ADA292DB2C9C019272
                                                              APIs
                                                              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,007B43BF,00000000), ref: 007B4FA6
                                                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 007B4FD2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Internet$AvailableDataFileQueryRead
                                                              • String ID:
                                                              • API String ID: 599397726-0
                                                              • Opcode ID: c8594482fe6ae1f7e1b99f82ab2af72f59a428ea4f35b9c9d37ab08b2047e9db
                                                              • Instruction ID: c5b8ad874c2cc2704404162428920335641141262eb644dbb1a070bd18d60aa3
                                                              • Opcode Fuzzy Hash: c8594482fe6ae1f7e1b99f82ab2af72f59a428ea4f35b9c9d37ab08b2047e9db
                                                              • Instruction Fuzzy Hash: BD41C371604609FFEB209E94DC85FFFB7BCEB40764F14402AF605A7182EA799E4197A0
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 007AE20D
                                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 007AE267
                                                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 007AE2B4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$DiskFreeSpace
                                                              • String ID:
                                                              • API String ID: 1682464887-0
                                                              • Opcode ID: c0a0730033b46a4df30ef8ef0273b2d50fcf130adeded10104e50c3454927d47
                                                              • Instruction ID: 973f197b6933ee2a2db47dd29aa3bb8ebbcb380eeb3993af94e82552c5bea9fb
                                                              • Opcode Fuzzy Hash: c0a0730033b46a4df30ef8ef0273b2d50fcf130adeded10104e50c3454927d47
                                                              • Instruction Fuzzy Hash: C1216D35A00118EFCB00EFA5D884EADBBF9FF89310F0584A9E945AB351DB359905CB54
                                                              APIs
                                                                • Part of subcall function 0077F4EA: std::exception::exception.LIBCMT ref: 0077F51E
                                                                • Part of subcall function 0077F4EA: __CxxThrowException@8.LIBCMT ref: 0077F533
                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0079B180
                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0079B1AD
                                                              • GetLastError.KERNEL32 ref: 0079B1BA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                              • String ID:
                                                              • API String ID: 1922334811-0
                                                              • Opcode ID: 5f230a00dc04da90591fd68db931c7b9f99ab8143ab1fc0fc66cfa406259ebe5
                                                              • Instruction ID: 2e23f1b397b1d7cd7d9f19dd77054d37c54578871bddf2ae0e90b638b6064932
                                                              • Opcode Fuzzy Hash: 5f230a00dc04da90591fd68db931c7b9f99ab8143ab1fc0fc66cfa406259ebe5
                                                              • Instruction Fuzzy Hash: 8C1191B2504205AFEB289F64EDC5D2BB7BDFB44750B20C52EF45A97241DB74FC418A60
                                                              APIs
                                                              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007A6623
                                                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 007A6664
                                                              • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007A666F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CloseControlCreateDeviceFileHandle
                                                              • String ID:
                                                              • API String ID: 33631002-0
                                                              • Opcode ID: f6dd1589e80e9d79681b2fb7e9ec1f054f0428cee80d512a318989b04f588f61
                                                              • Instruction ID: 832fa10221757fe2d025b7f144e858fe38ad52d379d362379f4c0bba85331d81
                                                              • Opcode Fuzzy Hash: f6dd1589e80e9d79681b2fb7e9ec1f054f0428cee80d512a318989b04f588f61
                                                              • Instruction Fuzzy Hash: 22116171E01228BFDB148FA4DC44BAEBBFCEB49B10F108152F900E7290D3B45E018BA5
                                                              APIs
                                                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 007A7223
                                                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007A723A
                                                              • FreeSid.ADVAPI32(?), ref: 007A724A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AllocateCheckFreeInitializeMembershipToken
                                                              • String ID:
                                                              • API String ID: 3429775523-0
                                                              • Opcode ID: 3c28da2c0ec8c857af8444542a8c4d102710879d3d7bbc54b9cf5adfa3fd281f
                                                              • Instruction ID: 913f8358e84ba3f05430c4f04776763bf710a0f3e03bede86dc2e3b4e14e20d3
                                                              • Opcode Fuzzy Hash: 3c28da2c0ec8c857af8444542a8c4d102710879d3d7bbc54b9cf5adfa3fd281f
                                                              • Instruction Fuzzy Hash: 7DF06D76A01208BFDF04DFE4CC89AEEBBBCFF08201F008469A602E6181E2349A048B14
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 007AF599
                                                              • FindClose.KERNEL32(00000000), ref: 007AF5C9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileFirst
                                                              • String ID:
                                                              • API String ID: 2295610775-0
                                                              • Opcode ID: fca1cd0774f8ee6162f821bb0ffd95621a4f050e3d6a75c06540626cadc911aa
                                                              • Instruction ID: b4894a20910a84fc703a843930928c6b23b5dc4d4e36af730b0d8f519d714e17
                                                              • Opcode Fuzzy Hash: fca1cd0774f8ee6162f821bb0ffd95621a4f050e3d6a75c06540626cadc911aa
                                                              • Instruction Fuzzy Hash: B611A531600204DFDB10DF68D849A2EB3E8FF95324F01851DF969DB291CB34AD118B95
                                                              APIs
                                                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,007BBE6A,?,?,00000000,?), ref: 007ACEA7
                                                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,007BBE6A,?,?,00000000,?), ref: 007ACEB9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorFormatLastMessage
                                                              • String ID:
                                                              • API String ID: 3479602957-0
                                                              • Opcode ID: 5a74b0c518a430a7b28d4bb954880758a74898eeed0813545ab4fb4a20b44beb
                                                              • Instruction ID: 100999b99e6669c23731cbe0380208a1a587933651961b654b7f49223524f4c7
                                                              • Opcode Fuzzy Hash: 5a74b0c518a430a7b28d4bb954880758a74898eeed0813545ab4fb4a20b44beb
                                                              • Instruction Fuzzy Hash: 16F08231105229FBDB21ABA4DC89FEA776DFF09351F008265F915D6181D6349A40CBA1
                                                              APIs
                                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 007A4153
                                                              • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 007A4166
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: InputSendkeybd_event
                                                              • String ID:
                                                              • API String ID: 3536248340-0
                                                              • Opcode ID: ed45f90e508eb11e7751730839944234551bec6e3a02a5efaf93721a70bb67ad
                                                              • Instruction ID: 723173ba13c9376460eee33b77c6f298f699f452eec76125db212a1299f88c20
                                                              • Opcode Fuzzy Hash: ed45f90e508eb11e7751730839944234551bec6e3a02a5efaf93721a70bb67ad
                                                              • Instruction Fuzzy Hash: 20F06D7080038DAFDB058FA4C845BBE7BB0EF04305F008409F9659A191D7B986129FA5
                                                              APIs
                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0079ACC0), ref: 0079AB99
                                                              • CloseHandle.KERNEL32(?,?,0079ACC0), ref: 0079ABAB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AdjustCloseHandlePrivilegesToken
                                                              • String ID:
                                                              • API String ID: 81990902-0
                                                              • Opcode ID: 3177c5095a94d10d30408282afa4562c5977978bcb366feb920d70e3e4ba187a
                                                              • Instruction ID: cfe5aec4e5cf18cd37093b8cdbd8947c6d20a68ab540a949043e5adccde25616
                                                              • Opcode Fuzzy Hash: 3177c5095a94d10d30408282afa4562c5977978bcb366feb920d70e3e4ba187a
                                                              • Instruction Fuzzy Hash: F5E0E671001510EFEB252F54FD09D7777EAEF04360B10C429F45985470D7665C90DB51
                                                              APIs
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00786DB3,-0000031A,?,?,00000001), ref: 007881B1
                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 007881BA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled
                                                              • String ID:
                                                              • API String ID: 3192549508-0
                                                              • Opcode ID: c7d41cde001ff6d18451745bb17e61d20e796ffee831c0cd4b957d19981d08ef
                                                              • Instruction ID: b00be917e494e943fdee73efea104ca8d1a57d4f3cc8f78ca26a6dd4a92931fe
                                                              • Opcode Fuzzy Hash: c7d41cde001ff6d18451745bb17e61d20e796ffee831c0cd4b957d19981d08ef
                                                              • Instruction Fuzzy Hash: 2BB09232045648EBDB102BA1EC49B597F68EB0D652F008010F60D4C0A18B7758108A9A
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID:
                                                              • API String ID: 4104443479-0
                                                              • Opcode ID: 9346626a587363d2beabd7a8336d860a37405376b08b26f1a36433d99b3e97f9
                                                              • Instruction ID: 969704df965a6d22baa0909ef058a8e47ff59a98872ec5dd92dca90c69295542
                                                              • Opcode Fuzzy Hash: 9346626a587363d2beabd7a8336d860a37405376b08b26f1a36433d99b3e97f9
                                                              • Instruction Fuzzy Hash: B6A26E70D05219CFDB28CF59C4806ADBBB1FF48354F2581AAD85AAB391D7389E81DF90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throwstd::exception::exception
                                                              • String ID: @
                                                              • API String ID: 3728558374-2766056989
                                                              • Opcode ID: 657c6f2d41850018a60c97b82502e0273f0eb10de701fb1f004b5e84b5217079
                                                              • Instruction ID: 1fc0cdb9fc6bbe9c3d47a97f976dacd202715cddf6c6c345fb52a78bfb9e8525
                                                              • Opcode Fuzzy Hash: 657c6f2d41850018a60c97b82502e0273f0eb10de701fb1f004b5e84b5217079
                                                              • Instruction Fuzzy Hash: 21729C71A04208EFCF24DF94C485AAEB7B5FF48380F14C05AE909AB391D779AE45DB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d28272d74e630daf4799161e7dd7d8270d52a0ba96f368f8b12cac4399aff7ba
                                                              • Instruction ID: 284584fb4ed6ab6ec517d081f8d65d6c82edb12ff7e23cb30a51da97409dc5a3
                                                              • Opcode Fuzzy Hash: d28272d74e630daf4799161e7dd7d8270d52a0ba96f368f8b12cac4399aff7ba
                                                              • Instruction Fuzzy Hash: F8321421D69F414DD723A634C822335A389EFB73D4F15D727E819B59AAEB2DD8838204
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __itow__swprintf
                                                              • String ID:
                                                              • API String ID: 674341424-0
                                                              • Opcode ID: d0258798974150c03d57f8f1cdc8d2076ffa55a54860282e6c3fa714c3aec5e5
                                                              • Instruction ID: 307c36a1a21c139623bc4cabf361b60cf52669ef80de3eb202c6bb19a51dea62
                                                              • Opcode Fuzzy Hash: d0258798974150c03d57f8f1cdc8d2076ffa55a54860282e6c3fa714c3aec5e5
                                                              • Instruction Fuzzy Hash: 0E229A71608301DFDB25DF14C894B6FB7E8AF84310F10891EFA9A97291DB79E945CB82
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3c42c7c44994a880a1a88a1edd4a55089d21fe8a22748a5eedd6c879ca9b00f4
                                                              • Instruction ID: 24dd9535051a7573dfa2349f22158d7d3507ddf59b0ce3fe7a8abca8ffa2f176
                                                              • Opcode Fuzzy Hash: 3c42c7c44994a880a1a88a1edd4a55089d21fe8a22748a5eedd6c879ca9b00f4
                                                              • Instruction Fuzzy Hash: 8BB1E320D2AF414DD6239639D831336BB5CAFBB2D5F92D71BFC2674D22EB2585838184
                                                              APIs
                                                              • __time64.LIBCMT ref: 007AB6DF
                                                                • Part of subcall function 0078344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,007ABDC3,00000000,?,?,?,?,007ABF70,00000000,?), ref: 00783453
                                                                • Part of subcall function 0078344A: __aulldiv.LIBCMT ref: 00783473
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Time$FileSystem__aulldiv__time64
                                                              • String ID:
                                                              • API String ID: 2893107130-0
                                                              • Opcode ID: 5e650b494b40aff623a9c4205bf7a1ad2b8424fbff471c35a4d1f79b8cb48f29
                                                              • Instruction ID: 52f191e5354a9bea66d5110cc48f3aead982bcde360c97c714646a29972048d6
                                                              • Opcode Fuzzy Hash: 5e650b494b40aff623a9c4205bf7a1ad2b8424fbff471c35a4d1f79b8cb48f29
                                                              • Instruction Fuzzy Hash: 4021A272634510CBC72ACF78D891A92B7E1EB95310B248E7DE0E5CB2C1CB78BA05CB54
                                                              APIs
                                                              • BlockInput.USER32(00000001), ref: 007B6ACA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: BlockInput
                                                              • String ID:
                                                              • API String ID: 3456056419-0
                                                              • Opcode ID: f9f62222e064f787bbe951b727f144d4716495ddd26f0f86188c94dbee09d9ce
                                                              • Instruction ID: 51fa312b50cbddaabcfbf2bd6ad90fb3243f159bc99a24bf2d48bf4c5febdd3d
                                                              • Opcode Fuzzy Hash: f9f62222e064f787bbe951b727f144d4716495ddd26f0f86188c94dbee09d9ce
                                                              • Instruction Fuzzy Hash: 2BE01235210204AFDB10EB59D844A96B7ECAF78751F04C416EA45D7351DAB8E8048BA0
                                                              APIs
                                                              • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 007A750A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: mouse_event
                                                              • String ID:
                                                              • API String ID: 2434400541-0
                                                              • Opcode ID: a44cad8f6a98482589fb0a2acb88eea082e3cb6754f2e75c6f72e96df9ee4c1f
                                                              • Instruction ID: 4f3b5032da65db0a0d9a821838ccc8896de62a76fa804a1157880fc84253d752
                                                              • Opcode Fuzzy Hash: a44cad8f6a98482589fb0a2acb88eea082e3cb6754f2e75c6f72e96df9ee4c1f
                                                              • Instruction Fuzzy Hash: 17D067A656C6456DE82D07249C1BFB61508A386B82FD447497603990C0B89C5D12E039
                                                              APIs
                                                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,0079AD3E), ref: 0079B124
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: LogonUser
                                                              • String ID:
                                                              • API String ID: 1244722697-0
                                                              • Opcode ID: 53aba318614bdc22f61b01643f314cf66cf2cef774800588df4ed48183e7e0ee
                                                              • Instruction ID: e7e0d55f21d2ef45e4316afb2d12c26efbccf8c38c60120c25b9ffad00c9424a
                                                              • Opcode Fuzzy Hash: 53aba318614bdc22f61b01643f314cf66cf2cef774800588df4ed48183e7e0ee
                                                              • Instruction Fuzzy Hash: 62D05E321A464EAEDF024FA4DC02EAE3F6AEB04700F448110FA21C90A0C675D931AB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: NameUser
                                                              • String ID:
                                                              • API String ID: 2645101109-0
                                                              • Opcode ID: 162fafd749e7be438d434225fdad45ca71be7d13fbb42b2c1187c8f1725f3676
                                                              • Instruction ID: f21c118ec329420e7f96753c885f8b3f5d357812d4b8b58e6ae4b411292c90a3
                                                              • Opcode Fuzzy Hash: 162fafd749e7be438d434225fdad45ca71be7d13fbb42b2c1187c8f1725f3676
                                                              • Instruction Fuzzy Hash: DEC04CB1401159DFC751CBC0C9849EEB7BCAB08301F1450929105F1110D7749B459B76
                                                              APIs
                                                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0078818F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled
                                                              • String ID:
                                                              • API String ID: 3192549508-0
                                                              • Opcode ID: 0c745798cbcd4c7a24e1af0ea7e6ff2694e3b523f05efa7c8007dbde6b12b824
                                                              • Instruction ID: bfa82c1f8496172447028f5cc99a50eab80fae0fbd38f836643817d833f6be94
                                                              • Opcode Fuzzy Hash: 0c745798cbcd4c7a24e1af0ea7e6ff2694e3b523f05efa7c8007dbde6b12b824
                                                              • Instruction Fuzzy Hash: 7BA0223200020CFBCF002F82FC088883F2CFB082A0B008020F80C0C030CB33AC208ACA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: BuffCharUpper
                                                              • String ID:
                                                              • API String ID: 3964851224-0
                                                              • Opcode ID: 736d05fe89e8dfae30c002e59e0634e763b618ac1a874fe7fc4bb37eaf22974e
                                                              • Instruction ID: e0f13b9578770d836ae252d6754ab6278d29108bd699d95e9806c6ca946e5863
                                                              • Opcode Fuzzy Hash: 736d05fe89e8dfae30c002e59e0634e763b618ac1a874fe7fc4bb37eaf22974e
                                                              • Instruction Fuzzy Hash: 80928970608341DFDB24DF18C484B6AB7E1BF88344F14885EE98A8B362D779ED45DB92
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4298170fd2a5d8b508746d8660b82730861a5494b725c40ded5a5396c22d1a69
                                                              • Instruction ID: c54426ecbb524969ae209348f0d999bd5a93936d2da4c73a0de7c61434271302
                                                              • Opcode Fuzzy Hash: 4298170fd2a5d8b508746d8660b82730861a5494b725c40ded5a5396c22d1a69
                                                              • Instruction Fuzzy Hash: 1C127F70A00209DFDF14DFA5D985AEEB7F9FF58300F108569E806E7251EB39A922CB54
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 731614b685802f68d407c9097affd77d2949ec02af12eb70fe0bced9a7234cbd
                                                              • Instruction ID: d0f3204c4fb434651c54a9125962f404abc72d86309bc6e4bf957d03f886b04f
                                                              • Opcode Fuzzy Hash: 731614b685802f68d407c9097affd77d2949ec02af12eb70fe0bced9a7234cbd
                                                              • Instruction Fuzzy Hash: 1F129E78A04206CFDB24DF58C484AAAB7B1FF54314F14C06AED4B9B351E739AD85CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throwstd::exception::exception
                                                              • String ID:
                                                              • API String ID: 3728558374-0
                                                              • Opcode ID: 11ee70ecdd8d7d0fe058e21c82db159e87cf4fed6495b98bd8bac51fb75aa4c7
                                                              • Instruction ID: d73b7469ea4bd6160602fa03cd9d58ad2ca16e769491bd10be3f5f8637a7d15e
                                                              • Opcode Fuzzy Hash: 11ee70ecdd8d7d0fe058e21c82db159e87cf4fed6495b98bd8bac51fb75aa4c7
                                                              • Instruction Fuzzy Hash: D102A2B0A00109DBCF04DF68D9856AEBBB5FF45300F10C46AEC0ADB256EB39D956CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                              • Instruction ID: a7a880ef93e3f049b983b5815433cb26fb598e82a258cd3a422a4a9c2f5f67b7
                                                              • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                              • Instruction Fuzzy Hash: 86C1E2322451930ADFAD463A853443EBAA15EA2BF531A077DD8B7CB4D1FF28C528D760
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                              • Instruction ID: af83742fc2aad725f600afd53a6c3ff16a32cdc96119eebb1f012bc541749857
                                                              • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                              • Instruction Fuzzy Hash: 25C101332451930AEFAD463AC53443EBAA15EA2BB530A437DD4B7CB0D5EF28D528D760
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                              • Instruction ID: 7feaa9faf707eb5dd776b5dedd27eb6c386e42bd6f4c68f230920b184acd30dd
                                                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                              • Instruction Fuzzy Hash: 56C1B43220909309DF2D4639C67443EBBA15AA2BF531A877DD8BBCB5D5EF28C524D620
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102902206.0000000000D66000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D66000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_d66000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                              • Instruction ID: e822a900fbbea03668bb43cfe18b8296ecfbfc952c8abcb0964df63217cc6062
                                                              • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                              • Instruction Fuzzy Hash: 4B41A271D1051CEBCF48CFADC991AAEFBF2AF88201F548299D516AB345D730AB41DB50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102902206.0000000000D66000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D66000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_d66000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 52b6af648c877ac6d6a76aa728722bf9b1b7a20dc0d1902be66db2f93aef2a5a
                                                              • Instruction ID: 01b9256a509b39c7261f419f011588e8d9fc2245174175d824876f5289b5f369
                                                              • Opcode Fuzzy Hash: 52b6af648c877ac6d6a76aa728722bf9b1b7a20dc0d1902be66db2f93aef2a5a
                                                              • Instruction Fuzzy Hash: 97019278A00109EFCB44DF98C5909AEF7F9FF58310F208599E819A7741D730AE42DB94
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102902206.0000000000D66000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D66000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_d66000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ab1ed642c9e2cf619b0ca28225d8e547d23f1e0e217189ac3431c3358c2c8a8c
                                                              • Instruction ID: a72b4504c755cfea66dbc26d84f7e72d53c23e281d36fd1119f9f137d3124bf8
                                                              • Opcode Fuzzy Hash: ab1ed642c9e2cf619b0ca28225d8e547d23f1e0e217189ac3431c3358c2c8a8c
                                                              • Instruction Fuzzy Hash: CC019278A00109EFCB44DF98C5909AEF7B9FF48310F208599E919A7745D730AE41DB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102902206.0000000000D66000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D66000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_d66000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                              • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                              • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                              • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                              APIs
                                                              • DeleteObject.GDI32(00000000), ref: 007BA2FE
                                                              • DeleteObject.GDI32(00000000), ref: 007BA310
                                                              • DestroyWindow.USER32 ref: 007BA31E
                                                              • GetDesktopWindow.USER32 ref: 007BA338
                                                              • GetWindowRect.USER32(00000000), ref: 007BA33F
                                                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 007BA480
                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 007BA490
                                                              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007BA4D8
                                                              • GetClientRect.USER32(00000000,?), ref: 007BA4E4
                                                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 007BA51E
                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007BA540
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007BA553
                                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007BA55E
                                                              • GlobalLock.KERNEL32(00000000), ref: 007BA567
                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007BA576
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 007BA57F
                                                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007BA586
                                                              • GlobalFree.KERNEL32(00000000), ref: 007BA591
                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007BA5A3
                                                              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,007ED9BC,00000000), ref: 007BA5B9
                                                              • GlobalFree.KERNEL32(00000000), ref: 007BA5C9
                                                              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 007BA5EF
                                                              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 007BA60E
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007BA630
                                                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007BA81D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                              • String ID: $AutoIt v3$DISPLAY$static
                                                              • API String ID: 2211948467-2373415609
                                                              • Opcode ID: 5492bc64f9e0766612d3a884e86156de7c633e142af42962ebfc1e4ee2dd35e3
                                                              • Instruction ID: 0eb6577c319553743948dcc7fcb9a5d50bfe8da7e56880c1bacafcbc9a986627
                                                              • Opcode Fuzzy Hash: 5492bc64f9e0766612d3a884e86156de7c633e142af42962ebfc1e4ee2dd35e3
                                                              • Instruction Fuzzy Hash: 97026071900258EFDB24DFA8CD89EAE7BB9FF48310F108158F915AB2A1D7789D41CB64
                                                              APIs
                                                              • SetTextColor.GDI32(?,00000000), ref: 007CD2DB
                                                              • GetSysColorBrush.USER32(0000000F), ref: 007CD30C
                                                              • GetSysColor.USER32(0000000F), ref: 007CD318
                                                              • SetBkColor.GDI32(?,000000FF), ref: 007CD332
                                                              • SelectObject.GDI32(?,00000000), ref: 007CD341
                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 007CD36C
                                                              • GetSysColor.USER32(00000010), ref: 007CD374
                                                              • CreateSolidBrush.GDI32(00000000), ref: 007CD37B
                                                              • FrameRect.USER32(?,?,00000000), ref: 007CD38A
                                                              • DeleteObject.GDI32(00000000), ref: 007CD391
                                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 007CD3DC
                                                              • FillRect.USER32(?,?,00000000), ref: 007CD40E
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 007CD439
                                                                • Part of subcall function 007CD575: GetSysColor.USER32(00000012), ref: 007CD5AE
                                                                • Part of subcall function 007CD575: SetTextColor.GDI32(?,?), ref: 007CD5B2
                                                                • Part of subcall function 007CD575: GetSysColorBrush.USER32(0000000F), ref: 007CD5C8
                                                                • Part of subcall function 007CD575: GetSysColor.USER32(0000000F), ref: 007CD5D3
                                                                • Part of subcall function 007CD575: GetSysColor.USER32(00000011), ref: 007CD5F0
                                                                • Part of subcall function 007CD575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 007CD5FE
                                                                • Part of subcall function 007CD575: SelectObject.GDI32(?,00000000), ref: 007CD60F
                                                                • Part of subcall function 007CD575: SetBkColor.GDI32(?,00000000), ref: 007CD618
                                                                • Part of subcall function 007CD575: SelectObject.GDI32(?,?), ref: 007CD625
                                                                • Part of subcall function 007CD575: InflateRect.USER32(?,000000FF,000000FF), ref: 007CD644
                                                                • Part of subcall function 007CD575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007CD65B
                                                                • Part of subcall function 007CD575: GetWindowLongW.USER32(00000000,000000F0), ref: 007CD670
                                                                • Part of subcall function 007CD575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 007CD698
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                              • String ID:
                                                              • API String ID: 3521893082-0
                                                              • Opcode ID: 9de9cfb2a2e1da1ae29f54eef5109111597faba259987c7aea40ae714356cf20
                                                              • Instruction ID: 509880d22606e9d66dd001cf9d84031b8d1823c32aef3b3be675638114029e28
                                                              • Opcode Fuzzy Hash: 9de9cfb2a2e1da1ae29f54eef5109111597faba259987c7aea40ae714356cf20
                                                              • Instruction Fuzzy Hash: 6891AF71009345FFCB209F64DC88E6B7BA9FB88325F104A2DF9629A1A0D779DD40CB56
                                                              APIs
                                                              • DestroyWindow.USER32 ref: 0077B98B
                                                              • DeleteObject.GDI32(00000000), ref: 0077B9CD
                                                              • DeleteObject.GDI32(00000000), ref: 0077B9D8
                                                              • DestroyIcon.USER32(00000000), ref: 0077B9E3
                                                              • DestroyWindow.USER32(00000000), ref: 0077B9EE
                                                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 007DD2AA
                                                              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 007DD2E3
                                                              • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 007DD711
                                                                • Part of subcall function 0077B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,0077B759,?,00000000,?,?,?,?,0077B72B,00000000,?), ref: 0077BA58
                                                              • SendMessageW.USER32 ref: 007DD758
                                                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 007DD76F
                                                              • ImageList_Destroy.COMCTL32(00000000), ref: 007DD785
                                                              • ImageList_Destroy.COMCTL32(00000000), ref: 007DD790
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                              • String ID: 0
                                                              • API String ID: 464785882-4108050209
                                                              • Opcode ID: 85a915348a513a92b76fd4f9e10cb3bcabb3fc53d40d32484b7833171421034b
                                                              • Instruction ID: 6a40905a2b6fd1beb68ef1ea55a617c2cf0d8bf2269f34b29dcfa70b38749415
                                                              • Opcode Fuzzy Hash: 85a915348a513a92b76fd4f9e10cb3bcabb3fc53d40d32484b7833171421034b
                                                              • Instruction Fuzzy Hash: 52127C70204241DFDB21CF24C888BA9BBB5FF49354F18856AEA99CB252C739FC55CB91
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 007ADBD6
                                                              • GetDriveTypeW.KERNEL32(?,007FDC54,?,\\.\,007FDC00), ref: 007ADCC3
                                                              • SetErrorMode.KERNEL32(00000000,007FDC54,?,\\.\,007FDC00), ref: 007ADE29
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$DriveType
                                                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                              • API String ID: 2907320926-4222207086
                                                              • Opcode ID: ea10abf92143be6d5f7a7aea8e0d1fa499ced5894f38c6cbeb54a8ded03acf7c
                                                              • Instruction ID: 45b8e09f854703ddc8bef6b640a1c84fabe4369f4db3a5862cdaf704f8b51a29
                                                              • Opcode Fuzzy Hash: ea10abf92143be6d5f7a7aea8e0d1fa499ced5894f38c6cbeb54a8ded03acf7c
                                                              • Instruction Fuzzy Hash: C551B231348302EB8720DF10C8858A9B7A5FFDA710B144A1AF467EBB95DB6CDE85D742
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __wcsnicmp
                                                              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                              • API String ID: 1038674560-86951937
                                                              • Opcode ID: 38a5451aaeb0d3c8bb03a87bab6c0b74d77fa12e37d97cadbc35c22f1cd631d0
                                                              • Instruction ID: 636d968fee5b6e253c5dbda5f741857ff1302c90e51c1a788f99c94c982d2c94
                                                              • Opcode Fuzzy Hash: 38a5451aaeb0d3c8bb03a87bab6c0b74d77fa12e37d97cadbc35c22f1cd631d0
                                                              • Instruction Fuzzy Hash: 8581D871740209EACB22AF64DC47FBE3779AF24740F044025FD46AA283EB6DD946C6A1
                                                              APIs
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 007CC788
                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 007CC83E
                                                              • SendMessageW.USER32(?,00001102,00000002,?), ref: 007CC859
                                                              • SendMessageW.USER32(?,000000F1,?,00000000), ref: 007CCB15
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window
                                                              • String ID: 0
                                                              • API String ID: 2326795674-4108050209
                                                              • Opcode ID: fb31e90ca8270a32cfb08862abc340606db0acdbb69b156d6d04adf538637244
                                                              • Instruction ID: e7c649c7dd0f375915d8c1e2476af64915e0f45fffb792c751e1ee99c70f3fdc
                                                              • Opcode Fuzzy Hash: fb31e90ca8270a32cfb08862abc340606db0acdbb69b156d6d04adf538637244
                                                              • Instruction Fuzzy Hash: 45F1BB71205341AFE7228F24C889FAABBE4FF49354F08462DF58C962A1C778DC41CBA1
                                                              APIs
                                                              • CharUpperBuffW.USER32(?,?,007FDC00), ref: 007C6449
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: BuffCharUpper
                                                              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                              • API String ID: 3964851224-45149045
                                                              • Opcode ID: bac0f33014b9a31a8e591887fd1ebefe3aff6ef35f7b843ab652ad65b0c293bd
                                                              • Instruction ID: b426d2e088b6a57a8fd4ffed1ce7139cb508c23ecf9974b9a1f99453b080aec9
                                                              • Opcode Fuzzy Hash: bac0f33014b9a31a8e591887fd1ebefe3aff6ef35f7b843ab652ad65b0c293bd
                                                              • Instruction Fuzzy Hash: 6AC17334204245CBCF05EF50D595EAE77E9BF94344F14886CF88A9B392DB28ED4ACB52
                                                              APIs
                                                              • GetSysColor.USER32(00000012), ref: 007CD5AE
                                                              • SetTextColor.GDI32(?,?), ref: 007CD5B2
                                                              • GetSysColorBrush.USER32(0000000F), ref: 007CD5C8
                                                              • GetSysColor.USER32(0000000F), ref: 007CD5D3
                                                              • CreateSolidBrush.GDI32(?), ref: 007CD5D8
                                                              • GetSysColor.USER32(00000011), ref: 007CD5F0
                                                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 007CD5FE
                                                              • SelectObject.GDI32(?,00000000), ref: 007CD60F
                                                              • SetBkColor.GDI32(?,00000000), ref: 007CD618
                                                              • SelectObject.GDI32(?,?), ref: 007CD625
                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 007CD644
                                                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007CD65B
                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 007CD670
                                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 007CD698
                                                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 007CD6BF
                                                              • InflateRect.USER32(?,000000FD,000000FD), ref: 007CD6DD
                                                              • DrawFocusRect.USER32(?,?), ref: 007CD6E8
                                                              • GetSysColor.USER32(00000011), ref: 007CD6F6
                                                              • SetTextColor.GDI32(?,00000000), ref: 007CD6FE
                                                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 007CD712
                                                              • SelectObject.GDI32(?,007CD2A5), ref: 007CD729
                                                              • DeleteObject.GDI32(?), ref: 007CD734
                                                              • SelectObject.GDI32(?,?), ref: 007CD73A
                                                              • DeleteObject.GDI32(?), ref: 007CD73F
                                                              • SetTextColor.GDI32(?,?), ref: 007CD745
                                                              • SetBkColor.GDI32(?,?), ref: 007CD74F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                              • String ID:
                                                              • API String ID: 1996641542-0
                                                              • Opcode ID: 851348c8b8964ce02aa83e312f04d5c14292cb6f01dfcce8008581b9a67eedf7
                                                              • Instruction ID: b00ea8c649257137ecd3efa4837993cd36619431c23fdef292b194ad1d17ea89
                                                              • Opcode Fuzzy Hash: 851348c8b8964ce02aa83e312f04d5c14292cb6f01dfcce8008581b9a67eedf7
                                                              • Instruction Fuzzy Hash: 0D514C71901248BFDF209FA4DC88EAE7B79FB08324F118119F915AB2A1D7799E40CF54
                                                              APIs
                                                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 007CB7B0
                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007CB7C1
                                                              • CharNextW.USER32(0000014E), ref: 007CB7F0
                                                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 007CB831
                                                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 007CB847
                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007CB858
                                                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 007CB875
                                                              • SetWindowTextW.USER32(?,0000014E), ref: 007CB8C7
                                                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 007CB8DD
                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 007CB90E
                                                              • _memset.LIBCMT ref: 007CB933
                                                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 007CB97C
                                                              • _memset.LIBCMT ref: 007CB9DB
                                                              • SendMessageW.USER32 ref: 007CBA05
                                                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 007CBA5D
                                                              • SendMessageW.USER32(?,0000133D,?,?), ref: 007CBB0A
                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 007CBB2C
                                                              • GetMenuItemInfoW.USER32(?), ref: 007CBB76
                                                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007CBBA3
                                                              • DrawMenuBar.USER32(?), ref: 007CBBB2
                                                              • SetWindowTextW.USER32(?,0000014E), ref: 007CBBDA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                              • String ID: 0
                                                              • API String ID: 1073566785-4108050209
                                                              • Opcode ID: 04878612cd01bdfa762d8e194e409732e0f1d820b9e40ecdb3cae5d03f917b7d
                                                              • Instruction ID: e9986a8549139caf0dbfeecd1142523a2ef24c107dd0c06805b0141057b20fb7
                                                              • Opcode Fuzzy Hash: 04878612cd01bdfa762d8e194e409732e0f1d820b9e40ecdb3cae5d03f917b7d
                                                              • Instruction Fuzzy Hash: FEE15DB5900218EBDF209FA1CC8AFEE7BB8EF05754F14815EF919AA190D77899418F60
                                                              APIs
                                                              • GetCursorPos.USER32(?), ref: 007C778A
                                                              • GetDesktopWindow.USER32 ref: 007C779F
                                                              • GetWindowRect.USER32(00000000), ref: 007C77A6
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 007C7808
                                                              • DestroyWindow.USER32(?), ref: 007C7834
                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 007C785D
                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007C787B
                                                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 007C78A1
                                                              • SendMessageW.USER32(?,00000421,?,?), ref: 007C78B6
                                                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 007C78C9
                                                              • IsWindowVisible.USER32(?), ref: 007C78E9
                                                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 007C7904
                                                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 007C7918
                                                              • GetWindowRect.USER32(?,?), ref: 007C7930
                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 007C7956
                                                              • GetMonitorInfoW.USER32 ref: 007C7970
                                                              • CopyRect.USER32(?,?), ref: 007C7987
                                                              • SendMessageW.USER32(?,00000412,00000000), ref: 007C79F2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                              • String ID: ($0$tooltips_class32
                                                              • API String ID: 698492251-4156429822
                                                              • Opcode ID: a7201db6a80b5e1084c87d0dfc38ecfcbdefb0855e63cd5aeae7fcbf66ace087
                                                              • Instruction ID: ded008fbac892d3b22db79b69c38a6c9c12f4438b1718895427aafa4272dea8d
                                                              • Opcode Fuzzy Hash: a7201db6a80b5e1084c87d0dfc38ecfcbdefb0855e63cd5aeae7fcbf66ace087
                                                              • Instruction Fuzzy Hash: 1FB16C71608340AFDB14DF64C989B5ABBE5BF88350F00891DF9999B291DB78EC04CF95
                                                              APIs
                                                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 007A6CFB
                                                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 007A6D21
                                                              • _wcscpy.LIBCMT ref: 007A6D4F
                                                              • _wcscmp.LIBCMT ref: 007A6D5A
                                                              • _wcscat.LIBCMT ref: 007A6D70
                                                              • _wcsstr.LIBCMT ref: 007A6D7B
                                                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 007A6D97
                                                              • _wcscat.LIBCMT ref: 007A6DE0
                                                              • _wcscat.LIBCMT ref: 007A6DE7
                                                              • _wcsncpy.LIBCMT ref: 007A6E12
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                              • API String ID: 699586101-1459072770
                                                              • Opcode ID: 8eaf87fa8b8cdc1846bcd62cb3499f12be0d0dcdf52ff5667aab99dc1c96abe6
                                                              • Instruction ID: cdea263939f602ddda490175d6ec28d7199fc7bd603e0e959e48ce217dbfb3c6
                                                              • Opcode Fuzzy Hash: 8eaf87fa8b8cdc1846bcd62cb3499f12be0d0dcdf52ff5667aab99dc1c96abe6
                                                              • Instruction Fuzzy Hash: 6F41D372640204FFEB10BB64CD4BEBF777CEF45750F044129F905A6182EA7C9A0597A6
                                                              APIs
                                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0077A939
                                                              • GetSystemMetrics.USER32(00000007), ref: 0077A941
                                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0077A96C
                                                              • GetSystemMetrics.USER32(00000008), ref: 0077A974
                                                              • GetSystemMetrics.USER32(00000004), ref: 0077A999
                                                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 0077A9B6
                                                              • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 0077A9C6
                                                              • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0077A9F9
                                                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 0077AA0D
                                                              • GetClientRect.USER32(00000000,000000FF), ref: 0077AA2B
                                                              • GetStockObject.GDI32(00000011), ref: 0077AA47
                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 0077AA52
                                                                • Part of subcall function 0077B63C: GetCursorPos.USER32(000000FF), ref: 0077B64F
                                                                • Part of subcall function 0077B63C: ScreenToClient.USER32(00000000,000000FF), ref: 0077B66C
                                                                • Part of subcall function 0077B63C: GetAsyncKeyState.USER32(00000001), ref: 0077B691
                                                                • Part of subcall function 0077B63C: GetAsyncKeyState.USER32(00000002), ref: 0077B69F
                                                              • SetTimer.USER32(00000000,00000000,00000028,0077AB87), ref: 0077AA79
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                              • String ID: AutoIt v3 GUI
                                                              • API String ID: 1458621304-248962490
                                                              • Opcode ID: 9d7669d5c3bd97e3b1c0c155a9ebc79de52a0043a96a1bec297630f114b35bb0
                                                              • Instruction ID: e7e6839026d12bc54d111fc313b11e3a5c48a836603773e4bef738ab2231b7a9
                                                              • Opcode Fuzzy Hash: 9d7669d5c3bd97e3b1c0c155a9ebc79de52a0043a96a1bec297630f114b35bb0
                                                              • Instruction Fuzzy Hash: EAB1917160020AEFDF24DFA8CC89BAD7BB4FB58350F118129FA09AB290D7789C51CB55
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$Foreground
                                                              • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                              • API String ID: 62970417-1919597938
                                                              • Opcode ID: 3447aa3d012eaf8404744c0574044b9bbb229bd41834cb428f1f275ae74a98db
                                                              • Instruction ID: 3bfc6866827b155943dddba1ed1d74ad849d1ac7f80c6784863cba0b8d702632
                                                              • Opcode Fuzzy Hash: 3447aa3d012eaf8404744c0574044b9bbb229bd41834cb428f1f275ae74a98db
                                                              • Instruction Fuzzy Hash: ECD1EB30108646DBCB14EF50C8859EABBB4FF64340F00495AF45A97663DB38F99BCB91
                                                              APIs
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C3735
                                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,007FDC00,00000000,?,00000000,?,?), ref: 007C37A3
                                                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 007C37EB
                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 007C3874
                                                              • RegCloseKey.ADVAPI32(?), ref: 007C3B94
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 007C3BA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Close$ConnectCreateRegistryValue
                                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                              • API String ID: 536824911-966354055
                                                              • Opcode ID: 59249a5e3837ac16a5f0ff87a18bf37fce1d48c5375325a4693346ac4f597bc2
                                                              • Instruction ID: 0a278589add399c0b26c024313fd67af5b979780ae212bfef059c193f22ce105
                                                              • Opcode Fuzzy Hash: 59249a5e3837ac16a5f0ff87a18bf37fce1d48c5375325a4693346ac4f597bc2
                                                              • Instruction Fuzzy Hash: 60021475604601DFCB15EF15C899E2AB7E9EF88720B05845DF99A9B2A1CB38ED01CB81
                                                              APIs
                                                              • CharUpperBuffW.USER32(?,?), ref: 007C6C56
                                                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 007C6D16
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: BuffCharMessageSendUpper
                                                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                              • API String ID: 3974292440-719923060
                                                              • Opcode ID: 7709cb639ac72048ff6b177136eb728994c1f8b191bd6417bf03e2b4ff7da4b6
                                                              • Instruction ID: f241271da46b42df4a385300c531b2ae7e11da96c50d76cd16eac79923de3101
                                                              • Opcode Fuzzy Hash: 7709cb639ac72048ff6b177136eb728994c1f8b191bd6417bf03e2b4ff7da4b6
                                                              • Instruction Fuzzy Hash: 98A16D74214241DFCB14EF20C995F6AB3A9FF84350F14896DB95A9B392DB38EC0ACB51
                                                              APIs
                                                              • GetClassNameW.USER32(?,?,00000100), ref: 0079CF91
                                                              • __swprintf.LIBCMT ref: 0079D032
                                                              • _wcscmp.LIBCMT ref: 0079D045
                                                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0079D09A
                                                              • _wcscmp.LIBCMT ref: 0079D0D6
                                                              • GetClassNameW.USER32(?,?,00000400), ref: 0079D10D
                                                              • GetDlgCtrlID.USER32(?), ref: 0079D15F
                                                              • GetWindowRect.USER32(?,?), ref: 0079D195
                                                              • GetParent.USER32(?), ref: 0079D1B3
                                                              • ScreenToClient.USER32(00000000), ref: 0079D1BA
                                                              • GetClassNameW.USER32(?,?,00000100), ref: 0079D234
                                                              • _wcscmp.LIBCMT ref: 0079D248
                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 0079D26E
                                                              • _wcscmp.LIBCMT ref: 0079D282
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                                              • String ID: %s%u
                                                              • API String ID: 3119225716-679674701
                                                              • Opcode ID: 18674a5bd6cd3d49d49d2ad6140f95b53645832f4e023cfd8999f0f33de6ee40
                                                              • Instruction ID: db772e99135bd65fdd27e6379fe5c601e40e41f619116605fc97856d622f3f6d
                                                              • Opcode Fuzzy Hash: 18674a5bd6cd3d49d49d2ad6140f95b53645832f4e023cfd8999f0f33de6ee40
                                                              • Instruction Fuzzy Hash: CFA1D271604306EFDB25DF64D884BAAB7A8FF48350F008619F999D7190DB38ED46CBA1
                                                              APIs
                                                              • GetClassNameW.USER32(00000008,?,00000400), ref: 0079D8EB
                                                              • _wcscmp.LIBCMT ref: 0079D8FC
                                                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 0079D924
                                                              • CharUpperBuffW.USER32(?,00000000), ref: 0079D941
                                                              • _wcscmp.LIBCMT ref: 0079D95F
                                                              • _wcsstr.LIBCMT ref: 0079D970
                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0079D9A8
                                                              • _wcscmp.LIBCMT ref: 0079D9B8
                                                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 0079D9DF
                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0079DA28
                                                              • _wcscmp.LIBCMT ref: 0079DA38
                                                              • GetClassNameW.USER32(00000010,?,00000400), ref: 0079DA60
                                                              • GetWindowRect.USER32(00000004,?), ref: 0079DAC9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                              • String ID: @$ThumbnailClass
                                                              • API String ID: 1788623398-1539354611
                                                              • Opcode ID: 1e90fb1c7099cdfc02dccdf5be485a229c582deb73ed35a1b7698a1d5f467d75
                                                              • Instruction ID: 91aecc4cd90b7d09bb823b9b0a41bae20ea6fb1dae8f6cc2217c52d914a9e667
                                                              • Opcode Fuzzy Hash: 1e90fb1c7099cdfc02dccdf5be485a229c582deb73ed35a1b7698a1d5f467d75
                                                              • Instruction Fuzzy Hash: B081D1710083459FDF21DF50D885FAA7BE8EF44314F04846AFD899A096DB38ED46CBA1
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __wcsnicmp
                                                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                              • API String ID: 1038674560-1810252412
                                                              • Opcode ID: 59100d047e8174e2e960ea97c099635f078e1e56a541d2027e355272833fbbfa
                                                              • Instruction ID: dbb48557ddbd298f71bb350f63b9c8160ee6141272dc74f7b092924fe704d5db
                                                              • Opcode Fuzzy Hash: 59100d047e8174e2e960ea97c099635f078e1e56a541d2027e355272833fbbfa
                                                              • Instruction Fuzzy Hash: 78319231A48205EADF24FB50ED57EEDB3B8AF20710F600129F952F11D2EB5DAE64C651
                                                              APIs
                                                              • LoadIconW.USER32(00000063), ref: 0079EAB0
                                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0079EAC2
                                                              • SetWindowTextW.USER32(?,?), ref: 0079EAD9
                                                              • GetDlgItem.USER32(?,000003EA), ref: 0079EAEE
                                                              • SetWindowTextW.USER32(00000000,?), ref: 0079EAF4
                                                              • GetDlgItem.USER32(?,000003E9), ref: 0079EB04
                                                              • SetWindowTextW.USER32(00000000,?), ref: 0079EB0A
                                                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0079EB2B
                                                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0079EB45
                                                              • GetWindowRect.USER32(?,?), ref: 0079EB4E
                                                              • SetWindowTextW.USER32(?,?), ref: 0079EBB9
                                                              • GetDesktopWindow.USER32 ref: 0079EBBF
                                                              • GetWindowRect.USER32(00000000), ref: 0079EBC6
                                                              • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0079EC12
                                                              • GetClientRect.USER32(?,?), ref: 0079EC1F
                                                              • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0079EC44
                                                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0079EC6F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                              • String ID:
                                                              • API String ID: 3869813825-0
                                                              • Opcode ID: 3574aed86df2ec0f5dbdcdd5f955866c138f85037214016f4b1df6b99415ee25
                                                              • Instruction ID: c82b62282e2633d126790859d0fb898191d0e92c976d2d30a96c4b440f8c162e
                                                              • Opcode Fuzzy Hash: 3574aed86df2ec0f5dbdcdd5f955866c138f85037214016f4b1df6b99415ee25
                                                              • Instruction Fuzzy Hash: 6F513C71900709EFDB21DFA8DD89E6EBBF5FF08705F008928E586A65A0D779A944CB10
                                                              APIs
                                                              • LoadCursorW.USER32(00000000,00007F8A), ref: 007B79C6
                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 007B79D1
                                                              • LoadCursorW.USER32(00000000,00007F03), ref: 007B79DC
                                                              • LoadCursorW.USER32(00000000,00007F8B), ref: 007B79E7
                                                              • LoadCursorW.USER32(00000000,00007F01), ref: 007B79F2
                                                              • LoadCursorW.USER32(00000000,00007F81), ref: 007B79FD
                                                              • LoadCursorW.USER32(00000000,00007F88), ref: 007B7A08
                                                              • LoadCursorW.USER32(00000000,00007F80), ref: 007B7A13
                                                              • LoadCursorW.USER32(00000000,00007F86), ref: 007B7A1E
                                                              • LoadCursorW.USER32(00000000,00007F83), ref: 007B7A29
                                                              • LoadCursorW.USER32(00000000,00007F85), ref: 007B7A34
                                                              • LoadCursorW.USER32(00000000,00007F82), ref: 007B7A3F
                                                              • LoadCursorW.USER32(00000000,00007F84), ref: 007B7A4A
                                                              • LoadCursorW.USER32(00000000,00007F04), ref: 007B7A55
                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 007B7A60
                                                              • LoadCursorW.USER32(00000000,00007F89), ref: 007B7A6B
                                                              • GetCursorInfo.USER32(?), ref: 007B7A7B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Cursor$Load$Info
                                                              • String ID:
                                                              • API String ID: 2577412497-0
                                                              • Opcode ID: 6be754854e0f40167fc8f003c251ad6ec5f84398e61bcd662be3348070dec4cc
                                                              • Instruction ID: 331bafbe54a4d67f039d9f24f3045a167358ed0756713879dd377ad6cf8eb77f
                                                              • Opcode Fuzzy Hash: 6be754854e0f40167fc8f003c251ad6ec5f84398e61bcd662be3348070dec4cc
                                                              • Instruction Fuzzy Hash: A53117B0D083196ADB509FBA8C8999FBFE8FF44750F504526E50DE7280DA7CA500CFA1
                                                              APIs
                                                                • Part of subcall function 0077E968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,0076C8B7,?,00002000,?,?,00000000,?,0076419E,?,?,?,007FDC00), ref: 0077E984
                                                                • Part of subcall function 0076660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007653B1,?,?,007661FF,?,00000000,00000001,00000000), ref: 0076662F
                                                              • __wsplitpath.LIBCMT ref: 0076C93E
                                                                • Part of subcall function 00781DFC: __wsplitpath_helper.LIBCMT ref: 00781E3C
                                                              • _wcscpy.LIBCMT ref: 0076C953
                                                              • _wcscat.LIBCMT ref: 0076C968
                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 0076C978
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0076CABE
                                                                • Part of subcall function 0076B337: _wcscpy.LIBCMT ref: 0076B36F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                                              • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                              • API String ID: 2258743419-1018226102
                                                              • Opcode ID: f5f8eaccbbad1fdb38e0dcb77b854e430acdda494542088f1bab5aedde3d288c
                                                              • Instruction ID: 6bf4b2d3a747e27cf5957fbf2e1e54b69cc585310e377df0160ba18d9dbdf5d7
                                                              • Opcode Fuzzy Hash: f5f8eaccbbad1fdb38e0dcb77b854e430acdda494542088f1bab5aedde3d288c
                                                              • Instruction Fuzzy Hash: AD127971508341DFC725EF24C985AAEBBF5BF99300F04491EF98A93251DB38DA49CB52
                                                              APIs
                                                              • _memset.LIBCMT ref: 007CCEFB
                                                              • DestroyWindow.USER32(?,?), ref: 007CCF73
                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 007CCFF4
                                                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 007CD016
                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007CD025
                                                              • DestroyWindow.USER32(?), ref: 007CD042
                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00760000,00000000), ref: 007CD075
                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007CD094
                                                              • GetDesktopWindow.USER32 ref: 007CD0A9
                                                              • GetWindowRect.USER32(00000000), ref: 007CD0B0
                                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 007CD0C2
                                                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 007CD0DA
                                                                • Part of subcall function 0077B526: GetWindowLongW.USER32(?,000000EB), ref: 0077B537
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                                              • String ID: 0$tooltips_class32
                                                              • API String ID: 3877571568-3619404913
                                                              • Opcode ID: aceda4151dfb38b11dee1a221bdc8184910522e69f2c900fc5810c6c36f8eb34
                                                              • Instruction ID: 54de9bb709ca180155bd9aae04a57832cf022a2675a4bd3113fcad6bda29e8ea
                                                              • Opcode Fuzzy Hash: aceda4151dfb38b11dee1a221bdc8184910522e69f2c900fc5810c6c36f8eb34
                                                              • Instruction Fuzzy Hash: 8D719EB0140249AFDB20CF28CC85F6A77E5FB98704F14852DF985872A1D778ED86CB16
                                                              APIs
                                                                • Part of subcall function 0077B34E: GetWindowLongW.USER32(?,000000EB), ref: 0077B35F
                                                              • DragQueryPoint.SHELL32(?,?), ref: 007CF37A
                                                                • Part of subcall function 007CD7DE: ClientToScreen.USER32(?,?), ref: 007CD807
                                                                • Part of subcall function 007CD7DE: GetWindowRect.USER32(?,?), ref: 007CD87D
                                                                • Part of subcall function 007CD7DE: PtInRect.USER32(?,?,007CED5A), ref: 007CD88D
                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 007CF3E3
                                                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 007CF3EE
                                                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 007CF411
                                                              • _wcscat.LIBCMT ref: 007CF441
                                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 007CF458
                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 007CF471
                                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 007CF488
                                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 007CF4AA
                                                              • DragFinish.SHELL32(?), ref: 007CF4B1
                                                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 007CF59C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                              • API String ID: 169749273-3440237614
                                                              • Opcode ID: 7387fe1b47bdcadf9299b2f6174c28eeb06ff0f427ee804e0cde1255284439a1
                                                              • Instruction ID: 45fdb3c4efae9b2bf919ce036b31adde744266a772e002eb63e5e48b22e2cf8b
                                                              • Opcode Fuzzy Hash: 7387fe1b47bdcadf9299b2f6174c28eeb06ff0f427ee804e0cde1255284439a1
                                                              • Instruction Fuzzy Hash: 2D616A71108340AFC711EF60DC89EAFBBE8FF99750F004A1EF595961A1DB749A09CB52
                                                              APIs
                                                              • VariantInit.OLEAUT32(00000000), ref: 007AAB3D
                                                              • VariantCopy.OLEAUT32(?,?), ref: 007AAB46
                                                              • VariantClear.OLEAUT32(?), ref: 007AAB52
                                                              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 007AAC40
                                                              • __swprintf.LIBCMT ref: 007AAC70
                                                              • VarR8FromDec.OLEAUT32(?,?), ref: 007AAC9C
                                                              • VariantInit.OLEAUT32(?), ref: 007AAD4D
                                                              • SysFreeString.OLEAUT32(00000016), ref: 007AADDF
                                                              • VariantClear.OLEAUT32(?), ref: 007AAE35
                                                              • VariantClear.OLEAUT32(?), ref: 007AAE44
                                                              • VariantInit.OLEAUT32(00000000), ref: 007AAE80
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                              • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                              • API String ID: 3730832054-3931177956
                                                              • Opcode ID: fa049a71092ccdbcf7bd2b18f590729be374583d7c1be20ced4598af8ab862c8
                                                              • Instruction ID: bef1aafb53a16b4c82beabbc4275a6402dbbb640601149fdc5fe62c1b1f41058
                                                              • Opcode Fuzzy Hash: fa049a71092ccdbcf7bd2b18f590729be374583d7c1be20ced4598af8ab862c8
                                                              • Instruction Fuzzy Hash: 26D1DFB1A04205FBDB209F65C889B6AB7B5FF86700F148655E8059B1C1DB7CEC50DBA3
                                                              APIs
                                                              • CharUpperBuffW.USER32(?,?), ref: 007C71FC
                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007C7247
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: BuffCharMessageSendUpper
                                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                              • API String ID: 3974292440-4258414348
                                                              • Opcode ID: d1091093f33c7e3c753dca4066b9ef542d95671a46537a858efbf55fd4a4b904
                                                              • Instruction ID: f41f7bcf5009711443d7090331ec1be62bacbbcf16acf327933a052cc5a552c4
                                                              • Opcode Fuzzy Hash: d1091093f33c7e3c753dca4066b9ef542d95671a46537a858efbf55fd4a4b904
                                                              • Instruction Fuzzy Hash: 8B916F74204641DBCF09EF10C845A6EB7A9BF94350F05885CBD9A6B393DB38ED4ACB91
                                                              APIs
                                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 007CE5AB
                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,007CBEAF), ref: 007CE607
                                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007CE647
                                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007CE68C
                                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007CE6C3
                                                              • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,007CBEAF), ref: 007CE6CF
                                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 007CE6DF
                                                              • DestroyIcon.USER32(?,?,?,?,?,007CBEAF), ref: 007CE6EE
                                                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 007CE70B
                                                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 007CE717
                                                                • Part of subcall function 00780FA7: __wcsicmp_l.LIBCMT ref: 00781030
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                              • String ID: .dll$.exe$.icl
                                                              • API String ID: 1212759294-1154884017
                                                              • Opcode ID: 4268c5d93e179f471f464006447762378922f118ec7252760c2b1d02c41fb7f1
                                                              • Instruction ID: 00a9203d01d74e412dfa2d8974cd9322a2d6c2401f4dc6621487810df1f6c267
                                                              • Opcode Fuzzy Hash: 4268c5d93e179f471f464006447762378922f118ec7252760c2b1d02c41fb7f1
                                                              • Instruction Fuzzy Hash: E461D271550215FAEB20DF64CC86FFE7BA8BB18724F108109F911EA1D0EB789E90C7A0
                                                              APIs
                                                                • Part of subcall function 0076936C: __swprintf.LIBCMT ref: 007693AB
                                                                • Part of subcall function 0076936C: __itow.LIBCMT ref: 007693DF
                                                              • CharLowerBuffW.USER32(?,?), ref: 007AD292
                                                              • GetDriveTypeW.KERNEL32 ref: 007AD2DF
                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007AD327
                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007AD35E
                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007AD38C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                              • API String ID: 1148790751-4113822522
                                                              • Opcode ID: 8667d7e2986226b1e04cc9feca117a77379ab6b4066d0352082037346a2da20a
                                                              • Instruction ID: 545a109d314147f45f96ababc95fd6c3b0d87a3773b0bfde8378c6ef93179a2f
                                                              • Opcode Fuzzy Hash: 8667d7e2986226b1e04cc9feca117a77379ab6b4066d0352082037346a2da20a
                                                              • Instruction Fuzzy Hash: FD514B71104704DFC700EF10C88596AB7E8FF99754F00895CF89AA72A1DB39EE0ACB52
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,007D3973,00000016,0000138C,00000016,?,00000016,007FDDB4,00000000,?), ref: 007A26F1
                                                              • LoadStringW.USER32(00000000,?,007D3973,00000016), ref: 007A26FA
                                                              • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,007D3973,00000016,0000138C,00000016,?,00000016,007FDDB4,00000000,?,00000016), ref: 007A271C
                                                              • LoadStringW.USER32(00000000,?,007D3973,00000016), ref: 007A271F
                                                              • __swprintf.LIBCMT ref: 007A276F
                                                              • __swprintf.LIBCMT ref: 007A2780
                                                              • _wprintf.LIBCMT ref: 007A2829
                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007A2840
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                              • API String ID: 618562835-2268648507
                                                              • Opcode ID: 48b262989dbf4db15c658c3b2ec90bc2f90973690a2e88f09be38fd5f3c5540b
                                                              • Instruction ID: 8ec3506c0c9f27278e1d237b78b542fdf42dbdfcc04ca8d1ba97c4456e3ab5d9
                                                              • Opcode Fuzzy Hash: 48b262989dbf4db15c658c3b2ec90bc2f90973690a2e88f09be38fd5f3c5540b
                                                              • Instruction Fuzzy Hash: 16416172800208FACB15FBD0DD8ADEEB77CAF55340F100165BA06B6092EA796F49DB61
                                                              APIs
                                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 007AD0D8
                                                              • __swprintf.LIBCMT ref: 007AD0FA
                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 007AD137
                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 007AD15C
                                                              • _memset.LIBCMT ref: 007AD17B
                                                              • _wcsncpy.LIBCMT ref: 007AD1B7
                                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 007AD1EC
                                                              • CloseHandle.KERNEL32(00000000), ref: 007AD1F7
                                                              • RemoveDirectoryW.KERNEL32(?), ref: 007AD200
                                                              • CloseHandle.KERNEL32(00000000), ref: 007AD20A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                              • String ID: :$\$\??\%s
                                                              • API String ID: 2733774712-3457252023
                                                              • Opcode ID: a18ae9cefcec112dde49ddb9b82ff7d0a0ea8c7f4c959f7c911d07e21816d64d
                                                              • Instruction ID: 0e7134ef1b10571a800c3a8367f7b9b4527e2d0ce11b59bc98b5d39015208d4a
                                                              • Opcode Fuzzy Hash: a18ae9cefcec112dde49ddb9b82ff7d0a0ea8c7f4c959f7c911d07e21816d64d
                                                              • Instruction Fuzzy Hash: 0A3193B2500149ABDB31DFA0CC49FEB37BCEF89740F1041B5F509D61A0E7789A458B24
                                                              APIs
                                                              • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,007CBEF4,?,?), ref: 007CE754
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,007CBEF4,?,?,00000000,?), ref: 007CE76B
                                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,007CBEF4,?,?,00000000,?), ref: 007CE776
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,007CBEF4,?,?,00000000,?), ref: 007CE783
                                                              • GlobalLock.KERNEL32(00000000), ref: 007CE78C
                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,007CBEF4,?,?,00000000,?), ref: 007CE79B
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 007CE7A4
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,007CBEF4,?,?,00000000,?), ref: 007CE7AB
                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,007CBEF4,?,?,00000000,?), ref: 007CE7BC
                                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,007ED9BC,?), ref: 007CE7D5
                                                              • GlobalFree.KERNEL32(00000000), ref: 007CE7E5
                                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 007CE809
                                                              • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 007CE834
                                                              • DeleteObject.GDI32(00000000), ref: 007CE85C
                                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 007CE872
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                              • String ID:
                                                              • API String ID: 3840717409-0
                                                              • Opcode ID: 40fdcec4ab3b0446bf0c047e8dcb9d68be4d4731af69b788838e849d3a451427
                                                              • Instruction ID: 21f0454a779f93a1f326b10f5c555e82198449359758cc2982accb11a61f4a24
                                                              • Opcode Fuzzy Hash: 40fdcec4ab3b0446bf0c047e8dcb9d68be4d4731af69b788838e849d3a451427
                                                              • Instruction Fuzzy Hash: 4A412775601248EFDB219F65DC88EAA7BBCFB89715F108058F906DB2A0D739AD41DB20
                                                              APIs
                                                              • __wsplitpath.LIBCMT ref: 007B076F
                                                              • _wcscat.LIBCMT ref: 007B0787
                                                              • _wcscat.LIBCMT ref: 007B0799
                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 007B07AE
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007B07C2
                                                              • GetFileAttributesW.KERNEL32(?), ref: 007B07DA
                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 007B07F4
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007B0806
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                              • String ID: *.*
                                                              • API String ID: 34673085-438819550
                                                              • Opcode ID: df5b31e658e2ba162368dca3c4d8dc1e3bddd3491b07a4487856a01a1d2f20b7
                                                              • Instruction ID: 3811edcf749c2e76e6852ceb8bf26a6dccc42b3e4d897ce2a0b2d50f76cce321
                                                              • Opcode Fuzzy Hash: df5b31e658e2ba162368dca3c4d8dc1e3bddd3491b07a4487856a01a1d2f20b7
                                                              • Instruction Fuzzy Hash: 70817171504345DFCB24EF24C845AAFB7E8BBD8344F14882EF889D7251EA38E9558BD2
                                                              APIs
                                                                • Part of subcall function 0077B34E: GetWindowLongW.USER32(?,000000EB), ref: 0077B35F
                                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 007CEF3B
                                                              • GetFocus.USER32 ref: 007CEF4B
                                                              • GetDlgCtrlID.USER32(00000000), ref: 007CEF56
                                                              • _memset.LIBCMT ref: 007CF081
                                                              • GetMenuItemInfoW.USER32 ref: 007CF0AC
                                                              • GetMenuItemCount.USER32(00000000), ref: 007CF0CC
                                                              • GetMenuItemID.USER32(?,00000000), ref: 007CF0DF
                                                              • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 007CF113
                                                              • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 007CF15B
                                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007CF193
                                                              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 007CF1C8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                              • String ID: 0
                                                              • API String ID: 1296962147-4108050209
                                                              • Opcode ID: e93045e5273a813a8ef693b97099b9ecffd75d81a09e38b91360498d838deb28
                                                              • Instruction ID: 24a804faa8df815df845bd98be1bae1bf18c951ce050a17d54faf898236f0da3
                                                              • Opcode Fuzzy Hash: e93045e5273a813a8ef693b97099b9ecffd75d81a09e38b91360498d838deb28
                                                              • Instruction Fuzzy Hash: 7F818B70605345EFDB20CF14C888EABBBEAFB88314F14452EF99897291D738D945CB92
                                                              APIs
                                                                • Part of subcall function 0079ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0079ABD7
                                                                • Part of subcall function 0079ABBB: GetLastError.KERNEL32(?,0079A69F,?,?,?), ref: 0079ABE1
                                                                • Part of subcall function 0079ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0079A69F,?,?,?), ref: 0079ABF0
                                                                • Part of subcall function 0079ABBB: HeapAlloc.KERNEL32(00000000,?,0079A69F,?,?,?), ref: 0079ABF7
                                                                • Part of subcall function 0079ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0079AC0E
                                                                • Part of subcall function 0079AC56: GetProcessHeap.KERNEL32(00000008,0079A6B5,00000000,00000000,?,0079A6B5,?), ref: 0079AC62
                                                                • Part of subcall function 0079AC56: HeapAlloc.KERNEL32(00000000,?,0079A6B5,?), ref: 0079AC69
                                                                • Part of subcall function 0079AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0079A6B5,?), ref: 0079AC7A
                                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0079A8CB
                                                              • _memset.LIBCMT ref: 0079A8E0
                                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0079A8FF
                                                              • GetLengthSid.ADVAPI32(?), ref: 0079A910
                                                              • GetAce.ADVAPI32(?,00000000,?), ref: 0079A94D
                                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0079A969
                                                              • GetLengthSid.ADVAPI32(?), ref: 0079A986
                                                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0079A995
                                                              • HeapAlloc.KERNEL32(00000000), ref: 0079A99C
                                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0079A9BD
                                                              • CopySid.ADVAPI32(00000000), ref: 0079A9C4
                                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0079A9F5
                                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0079AA1B
                                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0079AA2F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                              • String ID:
                                                              • API String ID: 3996160137-0
                                                              • Opcode ID: 1d6ff9a092baa3dacd03e11fbdc40e394f72ff76afce3da9b43f7cdb4b43df3c
                                                              • Instruction ID: f7043a012e48c3078563ee14005ca7db2b1f8162961ba09587fa0ac1f21a03fd
                                                              • Opcode Fuzzy Hash: 1d6ff9a092baa3dacd03e11fbdc40e394f72ff76afce3da9b43f7cdb4b43df3c
                                                              • Instruction Fuzzy Hash: 76511EB1901149BFDF10DF94ED89AEEBB79FF08310F048119F915AA290DB399A05CBA1
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: LoadString__swprintf_wprintf
                                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                              • API String ID: 2889450990-2391861430
                                                              • Opcode ID: 797a30e096da916117ef09644a4b8f51cca61a5a0f23829d842764b22b003d1f
                                                              • Instruction ID: 1202a7c0589271244924b51264f87b4cc067b1a3e29c2e4c3c4a7e4f768901a0
                                                              • Opcode Fuzzy Hash: 797a30e096da916117ef09644a4b8f51cca61a5a0f23829d842764b22b003d1f
                                                              • Instruction Fuzzy Hash: 80515C71900509FACF16EBA0CD4AEEEB778AF09300F104165F906721A2EB796F59DF61
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: LoadString__swprintf_wprintf
                                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                              • API String ID: 2889450990-3420473620
                                                              • Opcode ID: 377bb57295b18a4d9add3e8aea537381745d99c498a1418d560d35513918183b
                                                              • Instruction ID: 779318ee7279ecf0c7cc75e5f295bf4d2c0e1cc4f400457c6c274001f68cbdc6
                                                              • Opcode Fuzzy Hash: 377bb57295b18a4d9add3e8aea537381745d99c498a1418d560d35513918183b
                                                              • Instruction Fuzzy Hash: AF519F71900109FACF26EBE0CD4AEEEB778AF05300F104165B90A72152EB796F59DF61
                                                              APIs
                                                              • _memset.LIBCMT ref: 007A55D7
                                                              • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 007A5664
                                                              • GetMenuItemCount.USER32(00821708), ref: 007A56ED
                                                              • DeleteMenu.USER32(00821708,00000005,00000000,000000F5,?,?), ref: 007A577D
                                                              • DeleteMenu.USER32(00821708,00000004,00000000), ref: 007A5785
                                                              • DeleteMenu.USER32(00821708,00000006,00000000), ref: 007A578D
                                                              • DeleteMenu.USER32(00821708,00000003,00000000), ref: 007A5795
                                                              • GetMenuItemCount.USER32(00821708), ref: 007A579D
                                                              • SetMenuItemInfoW.USER32(00821708,00000004,00000000,00000030), ref: 007A57D3
                                                              • GetCursorPos.USER32(?), ref: 007A57DD
                                                              • SetForegroundWindow.USER32(00000000), ref: 007A57E6
                                                              • TrackPopupMenuEx.USER32(00821708,00000000,?,00000000,00000000,00000000), ref: 007A57F9
                                                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007A5805
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                              • String ID:
                                                              • API String ID: 3993528054-0
                                                              • Opcode ID: 1f30eecec40faabaac02f5f888f2534d3754838ee5ecb8b4a54df9a6d4178ad6
                                                              • Instruction ID: b7a47366028b0a497fbb11eead75ab59ef37775659940976a044d483e00d1044
                                                              • Opcode Fuzzy Hash: 1f30eecec40faabaac02f5f888f2534d3754838ee5ecb8b4a54df9a6d4178ad6
                                                              • Instruction Fuzzy Hash: 63713370641A05FEEB209F14CC89FAABF65FF86764F244305F6146A1D0C7B95C10DB94
                                                              APIs
                                                              • _memset.LIBCMT ref: 0079A1DC
                                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 0079A211
                                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0079A22D
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 0079A249
                                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 0079A273
                                                              • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0079A29B
                                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0079A2A6
                                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0079A2AB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                              • API String ID: 1687751970-22481851
                                                              • Opcode ID: d5998f00f0bb98f523dbab6f907016791c6594c23bf41cbb8e6f4293df9e4485
                                                              • Instruction ID: 4dc646a9cf9b43958da5161f74c4f36e50e0a7e2dce885ea788ca6ec868a2da1
                                                              • Opcode Fuzzy Hash: d5998f00f0bb98f523dbab6f907016791c6594c23bf41cbb8e6f4293df9e4485
                                                              • Instruction Fuzzy Hash: 8841F776C11229EACF25EBA4DC85DEDB778FF08310F044129E806B7161EB789E05CB91
                                                              APIs
                                                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C2BB5,?,?), ref: 007C3C1D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: BuffCharUpper
                                                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                              • API String ID: 3964851224-909552448
                                                              • Opcode ID: 36c0770759436ebe73ce7ed5c8d382edcf70b7b5544a924fc9c5dc8956053630
                                                              • Instruction ID: 1e0792a66c7c13c392522e5087c2a3fad38640758691524abfc7f9b9e08e29d6
                                                              • Opcode Fuzzy Hash: 36c0770759436ebe73ce7ed5c8d382edcf70b7b5544a924fc9c5dc8956053630
                                                              • Instruction Fuzzy Hash: 7941607420024ACBDF01EF50D845EEA3729FF16340F10886CFC5A5B192EB78AE5ACB20
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,007D36F4,00000010,?,Bad directive syntax error,007FDC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 007A25D6
                                                              • LoadStringW.USER32(00000000,?,007D36F4,00000010), ref: 007A25DD
                                                              • _wprintf.LIBCMT ref: 007A2610
                                                              • __swprintf.LIBCMT ref: 007A2632
                                                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 007A26A1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                              • API String ID: 1080873982-4153970271
                                                              • Opcode ID: 6a1fa568f4b3f3872369286d0ea0ce533441507546894c2f209c7b4a583f34c2
                                                              • Instruction ID: 54f63d444eec76c576fe4672671ba290d5f998ece9d4040cc6e75dda7678db72
                                                              • Opcode Fuzzy Hash: 6a1fa568f4b3f3872369286d0ea0ce533441507546894c2f209c7b4a583f34c2
                                                              • Instruction Fuzzy Hash: 2F216D3190021EEFCF12BB90CC4AEEE7739FF19304F004455F916A61A2DA79AA55DB51
                                                              APIs
                                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007A7B42
                                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007A7B58
                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007A7B69
                                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 007A7B7B
                                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 007A7B8C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: SendString
                                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                              • API String ID: 890592661-1007645807
                                                              • Opcode ID: 3c86b076948bf1b8a3536e16efcd15493fa8472efb6807f5d04b6204201f2419
                                                              • Instruction ID: a573af4ae2ee1d4ac0ec8a93162a114fcd67719cb4c72c92dafbf44eb69090b5
                                                              • Opcode Fuzzy Hash: 3c86b076948bf1b8a3536e16efcd15493fa8472efb6807f5d04b6204201f2419
                                                              • Instruction Fuzzy Hash: CB1182E1A50269B9D724A761CC4ADFF7A7CEFD2B10F0009297822E61D1DA681E85C6B1
                                                              APIs
                                                              • timeGetTime.WINMM ref: 007A7794
                                                                • Part of subcall function 0077DC38: timeGetTime.WINMM(?,75A8B400,007D58AB), ref: 0077DC3C
                                                              • Sleep.KERNEL32(0000000A), ref: 007A77C0
                                                              • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 007A77E4
                                                              • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 007A7806
                                                              • SetActiveWindow.USER32 ref: 007A7825
                                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007A7833
                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 007A7852
                                                              • Sleep.KERNEL32(000000FA), ref: 007A785D
                                                              • IsWindow.USER32 ref: 007A7869
                                                              • EndDialog.USER32(00000000), ref: 007A787A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                              • String ID: BUTTON
                                                              • API String ID: 1194449130-3405671355
                                                              • Opcode ID: dcc09b81df4fd3c6022d598e01e852ab37c9b167aff934d5f6714d4092e04888
                                                              • Instruction ID: 46e564a466471ad1ab62a0822a2911d995abae436bbd19b28eec071f85643c8e
                                                              • Opcode Fuzzy Hash: dcc09b81df4fd3c6022d598e01e852ab37c9b167aff934d5f6714d4092e04888
                                                              • Instruction Fuzzy Hash: 97216670205245EFE7255B60ECDDB263F69FB8A385F008124F50686272DB7D5D11DB25
                                                              APIs
                                                                • Part of subcall function 0076936C: __swprintf.LIBCMT ref: 007693AB
                                                                • Part of subcall function 0076936C: __itow.LIBCMT ref: 007693DF
                                                              • CoInitialize.OLE32(00000000), ref: 007B034B
                                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 007B03DE
                                                              • SHGetDesktopFolder.SHELL32(?), ref: 007B03F2
                                                              • CoCreateInstance.OLE32(007EDA8C,00000000,00000001,00813CF8,?), ref: 007B043E
                                                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 007B04AD
                                                              • CoTaskMemFree.OLE32(?,?), ref: 007B0505
                                                              • _memset.LIBCMT ref: 007B0542
                                                              • SHBrowseForFolderW.SHELL32(?), ref: 007B057E
                                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 007B05A1
                                                              • CoTaskMemFree.OLE32(00000000), ref: 007B05A8
                                                              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 007B05DF
                                                              • CoUninitialize.OLE32(00000001,00000000), ref: 007B05E1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                              • String ID:
                                                              • API String ID: 1246142700-0
                                                              • Opcode ID: 076e9d47d445d56b6ca6b3199d7de69c13633a476164e93a206030149e7bae05
                                                              • Instruction ID: 631a50f878959dab8074837db4cf543f62a883eeaa6294e3f992f82e42002d12
                                                              • Opcode Fuzzy Hash: 076e9d47d445d56b6ca6b3199d7de69c13633a476164e93a206030149e7bae05
                                                              • Instruction Fuzzy Hash: 20B1D975A00109EFDB14DFA4C888EAEBBB9FF49314B148469F906EB251D774ED41CB90
                                                              APIs
                                                              • GetKeyboardState.USER32(?), ref: 007A2ED6
                                                              • SetKeyboardState.USER32(?), ref: 007A2F41
                                                              • GetAsyncKeyState.USER32(000000A0), ref: 007A2F61
                                                              • GetKeyState.USER32(000000A0), ref: 007A2F78
                                                              • GetAsyncKeyState.USER32(000000A1), ref: 007A2FA7
                                                              • GetKeyState.USER32(000000A1), ref: 007A2FB8
                                                              • GetAsyncKeyState.USER32(00000011), ref: 007A2FE4
                                                              • GetKeyState.USER32(00000011), ref: 007A2FF2
                                                              • GetAsyncKeyState.USER32(00000012), ref: 007A301B
                                                              • GetKeyState.USER32(00000012), ref: 007A3029
                                                              • GetAsyncKeyState.USER32(0000005B), ref: 007A3052
                                                              • GetKeyState.USER32(0000005B), ref: 007A3060
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: State$Async$Keyboard
                                                              • String ID:
                                                              • API String ID: 541375521-0
                                                              • Opcode ID: 4c5accc0f55c38c4c8c4e62aad04256af1f4ea3724a5ea971bfa9cc10ed03536
                                                              • Instruction ID: 6876741bfc4b548cccd41147892748bfd477345b4cfaa5adf2be764db7a21b79
                                                              • Opcode Fuzzy Hash: 4c5accc0f55c38c4c8c4e62aad04256af1f4ea3724a5ea971bfa9cc10ed03536
                                                              • Instruction Fuzzy Hash: E551E9205087D869FB35DB6484547AABBB45F93340F088789D5C25A1C3DA9C9B8DC762
                                                              APIs
                                                              • GetDlgItem.USER32(?,00000001), ref: 0079ED1E
                                                              • GetWindowRect.USER32(00000000,?), ref: 0079ED30
                                                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0079ED8E
                                                              • GetDlgItem.USER32(?,00000002), ref: 0079ED99
                                                              • GetWindowRect.USER32(00000000,?), ref: 0079EDAB
                                                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0079EE01
                                                              • GetDlgItem.USER32(?,000003E9), ref: 0079EE0F
                                                              • GetWindowRect.USER32(00000000,?), ref: 0079EE20
                                                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0079EE63
                                                              • GetDlgItem.USER32(?,000003EA), ref: 0079EE71
                                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0079EE8E
                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0079EE9B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$ItemMoveRect$Invalidate
                                                              • String ID:
                                                              • API String ID: 3096461208-0
                                                              • Opcode ID: 1cba96a4f5b3dac244a798f4595dfa55d5870ad93b7d034ae653dcaa1a2f6a20
                                                              • Instruction ID: bf5920bd1ed0756cbdb82d628a6c8a6e8c39f9d9bf3904243f2414b5de699fc6
                                                              • Opcode Fuzzy Hash: 1cba96a4f5b3dac244a798f4595dfa55d5870ad93b7d034ae653dcaa1a2f6a20
                                                              • Instruction Fuzzy Hash: 08512071B00205AFDF18CF69DD85AAEBBBAFB88740F148129F919D7290D7759D008B14
                                                              APIs
                                                                • Part of subcall function 0077B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,0077B759,?,00000000,?,?,?,?,0077B72B,00000000,?), ref: 0077BA58
                                                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,0077B72B), ref: 0077B7F6
                                                              • KillTimer.USER32(00000000,?,00000000,?,?,?,?,0077B72B,00000000,?,?,0077B2EF,?,?), ref: 0077B88D
                                                              • DestroyAcceleratorTable.USER32(00000000), ref: 007DD8A6
                                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0077B72B,00000000,?,?,0077B2EF,?,?), ref: 007DD8D7
                                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0077B72B,00000000,?,?,0077B2EF,?,?), ref: 007DD8EE
                                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0077B72B,00000000,?,?,0077B2EF,?,?), ref: 007DD90A
                                                              • DeleteObject.GDI32(00000000), ref: 007DD91C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                              • String ID:
                                                              • API String ID: 641708696-0
                                                              • Opcode ID: 4894ae8ef736c373ddb5b91b45cc069ae05a04fde5b8d15c77a51a2d3aaf9428
                                                              • Instruction ID: b975e4bcf5cef486549d9461d90cf3215271a1cb5488c7567fbd38b249af44c6
                                                              • Opcode Fuzzy Hash: 4894ae8ef736c373ddb5b91b45cc069ae05a04fde5b8d15c77a51a2d3aaf9428
                                                              • Instruction Fuzzy Hash: 25618A30501700DFDF369F18D988B29B7B5FBA4351F25852EE08A8AA60C739BC91DB85
                                                              APIs
                                                                • Part of subcall function 0077B526: GetWindowLongW.USER32(?,000000EB), ref: 0077B537
                                                              • GetSysColor.USER32(0000000F), ref: 0077B438
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ColorLongWindow
                                                              • String ID:
                                                              • API String ID: 259745315-0
                                                              • Opcode ID: 6decb6bd7351f0fc893070cb6b3549d56d0e2ce40336e4b03339231a2239ed30
                                                              • Instruction ID: 69168046e2578f134dd62cc5888ba532bd91400800d0a58aac99d4f7a695af6f
                                                              • Opcode Fuzzy Hash: 6decb6bd7351f0fc893070cb6b3549d56d0e2ce40336e4b03339231a2239ed30
                                                              • Instruction Fuzzy Hash: DB41A030101194AFDF305F28DC89BB93B66AB0A771F19C261FD698E1E6D7388C42DB25
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                              • String ID:
                                                              • API String ID: 136442275-0
                                                              • Opcode ID: be8784d7b9bdf0fb9ca0af49e28883579c744d3ae8a179773dc6b391accd0f85
                                                              • Instruction ID: b82308651d1a6c3262275d56779f478bd66bc945a9303eb65574388ac6ecb0a9
                                                              • Opcode Fuzzy Hash: be8784d7b9bdf0fb9ca0af49e28883579c744d3ae8a179773dc6b391accd0f85
                                                              • Instruction Fuzzy Hash: DF41147788511CAECF61EB94CC55DDF73BCEB84300F0041A6B655A2051EA74ABE98FA0
                                                              APIs
                                                              • CharLowerBuffW.USER32(007FDC00,007FDC00,007FDC00), ref: 007AD7CE
                                                              • GetDriveTypeW.KERNEL32(?,00813A70,00000061), ref: 007AD898
                                                              • _wcscpy.LIBCMT ref: 007AD8C2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: BuffCharDriveLowerType_wcscpy
                                                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                              • API String ID: 2820617543-1000479233
                                                              • Opcode ID: 54142990d8b2ee23c072a82fee50b137aec05745f26ece7e91c70ab293d816dd
                                                              • Instruction ID: b79065c3261b4bf41d7f6612ca97db90587aa43372f74ad4ddb83f2b3db1470c
                                                              • Opcode Fuzzy Hash: 54142990d8b2ee23c072a82fee50b137aec05745f26ece7e91c70ab293d816dd
                                                              • Instruction Fuzzy Hash: 9451B435104300DFC710EF14C885AAEB7A9FF85354F108A2DF9AB57692DB39ED49CA52
                                                              APIs
                                                              • __swprintf.LIBCMT ref: 007693AB
                                                              • __itow.LIBCMT ref: 007693DF
                                                                • Part of subcall function 00781557: _xtow@16.LIBCMT ref: 00781578
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __itow__swprintf_xtow@16
                                                              • String ID: %.15g$0x%p$False$True
                                                              • API String ID: 1502193981-2263619337
                                                              • Opcode ID: c7fd008059cc057b207a276b423bd0176b5093b2995beab74a3903661b194e9e
                                                              • Instruction ID: 2ea05db7da799560bc18c9226dde0e47545d791169ac1a692d0d439897b9bd39
                                                              • Opcode Fuzzy Hash: c7fd008059cc057b207a276b423bd0176b5093b2995beab74a3903661b194e9e
                                                              • Instruction Fuzzy Hash: D841A472614204EBDB24EB75D946E6AB7FCEF44340F2044AFE54ED7381EA399941CB60
                                                              APIs
                                                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 007CA259
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 007CA260
                                                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 007CA273
                                                              • SelectObject.GDI32(00000000,00000000), ref: 007CA27B
                                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 007CA286
                                                              • DeleteDC.GDI32(00000000), ref: 007CA28F
                                                              • GetWindowLongW.USER32(?,000000EC), ref: 007CA299
                                                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 007CA2AD
                                                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 007CA2B9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                              • String ID: static
                                                              • API String ID: 2559357485-2160076837
                                                              • Opcode ID: 5cf112925ad167950f6286216fd7a6db50072e3026d1a7025354004d2dfa9e2e
                                                              • Instruction ID: 379f49a49d17701e6412ab421373abb66ccb6f2aff86b6987e291a85f49e815e
                                                              • Opcode Fuzzy Hash: 5cf112925ad167950f6286216fd7a6db50072e3026d1a7025354004d2dfa9e2e
                                                              • Instruction Fuzzy Hash: C7316931101218BFDF215FA4DC89FEA3B69FF5D365F114218FA19AA0A0C7399C11DBA5
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                              • String ID: 0.0.0.0
                                                              • API String ID: 2620052-3771769585
                                                              • Opcode ID: f0781d8cb75ddf373aabf140a6db89be1bd6e9b51ec26657b780010ced2789bb
                                                              • Instruction ID: a0c522369c4d4cc4bee380a435c69d6d61a682adc2622ec4003470addc2e3bab
                                                              • Opcode Fuzzy Hash: f0781d8cb75ddf373aabf140a6db89be1bd6e9b51ec26657b780010ced2789bb
                                                              • Instruction Fuzzy Hash: 3711E472604114AFDB24AB70AC4EEDA77ACEF85710F0441A5F105AA081EF7CAE858BA4
                                                              APIs
                                                              • _memset.LIBCMT ref: 00785047
                                                                • Part of subcall function 00787C0E: __getptd_noexit.LIBCMT ref: 00787C0E
                                                              • __gmtime64_s.LIBCMT ref: 007850E0
                                                              • __gmtime64_s.LIBCMT ref: 00785116
                                                              • __gmtime64_s.LIBCMT ref: 00785133
                                                              • __allrem.LIBCMT ref: 00785189
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007851A5
                                                              • __allrem.LIBCMT ref: 007851BC
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007851DA
                                                              • __allrem.LIBCMT ref: 007851F1
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0078520F
                                                              • __invoke_watson.LIBCMT ref: 00785280
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                              • String ID:
                                                              • API String ID: 384356119-0
                                                              • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                              • Instruction ID: a2ca131a71cb2ed1a1c159317a4a55608e1a561ba67e7491234e814d8af33c1d
                                                              • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                              • Instruction Fuzzy Hash: 5071C6B2A81F17EBDB14BE78DC45BAAB3A9BF00764F144229F510D6281EB78DD4087D0
                                                              APIs
                                                              • _memset.LIBCMT ref: 007A4DF8
                                                              • GetMenuItemInfoW.USER32(00821708,000000FF,00000000,00000030), ref: 007A4E59
                                                              • SetMenuItemInfoW.USER32(00821708,00000004,00000000,00000030), ref: 007A4E8F
                                                              • Sleep.KERNEL32(000001F4), ref: 007A4EA1
                                                              • GetMenuItemCount.USER32(?), ref: 007A4EE5
                                                              • GetMenuItemID.USER32(?,00000000), ref: 007A4F01
                                                              • GetMenuItemID.USER32(?,-00000001), ref: 007A4F2B
                                                              • GetMenuItemID.USER32(?,?), ref: 007A4F70
                                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007A4FB6
                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007A4FCA
                                                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007A4FEB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                              • String ID:
                                                              • API String ID: 4176008265-0
                                                              • Opcode ID: 9202b46d60d0f69c76c39408ce939710265bddf584c07123bc8f1d97f906825f
                                                              • Instruction ID: 9c6c2c707ba13603736619c086c1fe161d325bcd219861b18ebb619854dc5343
                                                              • Opcode Fuzzy Hash: 9202b46d60d0f69c76c39408ce939710265bddf584c07123bc8f1d97f906825f
                                                              • Instruction Fuzzy Hash: 43619371500289EFDF21CF68DC889AE7BB8FBC6308F184259F54197251D7BA9D05CB21
                                                              APIs
                                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 007C9C98
                                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 007C9C9B
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 007C9CBF
                                                              • _memset.LIBCMT ref: 007C9CD0
                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007C9CE2
                                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 007C9D5A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$LongWindow_memset
                                                              • String ID:
                                                              • API String ID: 830647256-0
                                                              • Opcode ID: c6cfe283aa7b662dec2051df30b32b426451bfcc0781dae6dd16eb36a1f3a5d1
                                                              • Instruction ID: dd896a0c040f01d70dc6a524fb5fc03772bb4f69a9580cddc815b4508a5aaee7
                                                              • Opcode Fuzzy Hash: c6cfe283aa7b662dec2051df30b32b426451bfcc0781dae6dd16eb36a1f3a5d1
                                                              • Instruction Fuzzy Hash: 13616975A00208EFDB20DFA4CC89FEE77B8EB19704F144159FA15A7291D778AD42DB60
                                                              APIs
                                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 007994FE
                                                              • SafeArrayAllocData.OLEAUT32(?), ref: 00799549
                                                              • VariantInit.OLEAUT32(?), ref: 0079955B
                                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 0079957B
                                                              • VariantCopy.OLEAUT32(?,?), ref: 007995BE
                                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 007995D2
                                                              • VariantClear.OLEAUT32(?), ref: 007995E7
                                                              • SafeArrayDestroyData.OLEAUT32(?), ref: 007995F4
                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007995FD
                                                              • VariantClear.OLEAUT32(?), ref: 0079960F
                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0079961A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                              • String ID:
                                                              • API String ID: 2706829360-0
                                                              • Opcode ID: 40c98033f2070d94bd6943915ce9bff5009366709457b6301f4811e2e42c130b
                                                              • Instruction ID: 4a2e3f6ce2a7ae545cc3614e5b0ded94fe123f8b284d1bc71841839908706e46
                                                              • Opcode Fuzzy Hash: 40c98033f2070d94bd6943915ce9bff5009366709457b6301f4811e2e42c130b
                                                              • Instruction Fuzzy Hash: D8418030900259EFDF11DFA8D8889DEBB78FF18350F008069E911A7291DB38EA45CBA1
                                                              APIs
                                                                • Part of subcall function 0076936C: __swprintf.LIBCMT ref: 007693AB
                                                                • Part of subcall function 0076936C: __itow.LIBCMT ref: 007693DF
                                                              • CoInitialize.OLE32 ref: 007BADF6
                                                              • CoUninitialize.OLE32 ref: 007BAE01
                                                              • CoCreateInstance.OLE32(?,00000000,00000017,007ED8FC,?), ref: 007BAE61
                                                              • IIDFromString.OLE32(?,?), ref: 007BAED4
                                                              • VariantInit.OLEAUT32(?), ref: 007BAF6E
                                                              • VariantClear.OLEAUT32(?), ref: 007BAFCF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                              • API String ID: 834269672-1287834457
                                                              • Opcode ID: fd33a74fd202d2337af669261dba068919e6ce9b2e490d0ca5c96b4e6515bd25
                                                              • Instruction ID: bd6a7c7227c10caefb5cbc62ce0a15cbb875cf2d80cf08afc848485738fee9cb
                                                              • Opcode Fuzzy Hash: fd33a74fd202d2337af669261dba068919e6ce9b2e490d0ca5c96b4e6515bd25
                                                              • Instruction Fuzzy Hash: 95619C71608301EFD720EF54C889BAABBE8EF89714F104919F9859B291D778ED44CB93
                                                              APIs
                                                              • WSAStartup.WSOCK32(00000101,?), ref: 007B8168
                                                              • inet_addr.WSOCK32(?,?,?), ref: 007B81AD
                                                              • gethostbyname.WSOCK32(?), ref: 007B81B9
                                                              • IcmpCreateFile.IPHLPAPI ref: 007B81C7
                                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 007B8237
                                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 007B824D
                                                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 007B82C2
                                                              • WSACleanup.WSOCK32 ref: 007B82C8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                              • String ID: Ping
                                                              • API String ID: 1028309954-2246546115
                                                              • Opcode ID: 2b3f59f081a962d5b90afc2cac20dea4d36556c565049adb1e69781c68da75ac
                                                              • Instruction ID: 2e0c8758a8d2b16bcc4f86c43b4f45dd38fb8b3d1f61fa637421c4970ecccf28
                                                              • Opcode Fuzzy Hash: 2b3f59f081a962d5b90afc2cac20dea4d36556c565049adb1e69781c68da75ac
                                                              • Instruction Fuzzy Hash: 5A5172316046049FDB619F64CC89BAA77E8FF48710F048969F95ADB2A1DB78ED01CB42
                                                              APIs
                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007B45FF
                                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 007B462B
                                                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 007B466D
                                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 007B4682
                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007B468F
                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 007B46BF
                                                              • InternetCloseHandle.WININET(00000000), ref: 007B4706
                                                                • Part of subcall function 007B5052: GetLastError.KERNEL32(?,?,007B43CC,00000000,00000000,00000001), ref: 007B5067
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                                              • String ID: $mmmmmm
                                                              • API String ID: 1241431887-410873962
                                                              • Opcode ID: 7160257d4812bbfc6e18c80ac6d43f8061ff2814e69a068609d3bf7638297107
                                                              • Instruction ID: 418fa911b3e48cfbc97316288987b7ddf207703425959e450dd0d3baeef348b7
                                                              • Opcode Fuzzy Hash: 7160257d4812bbfc6e18c80ac6d43f8061ff2814e69a068609d3bf7638297107
                                                              • Instruction Fuzzy Hash: 7F416DB1501619BFEB119F64CC89FFB77ACFF09358F008116FA059A152DBB89D448BA4
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 007AE396
                                                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 007AE40C
                                                              • GetLastError.KERNEL32 ref: 007AE416
                                                              • SetErrorMode.KERNEL32(00000000,READY), ref: 007AE483
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Error$Mode$DiskFreeLastSpace
                                                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                              • API String ID: 4194297153-14809454
                                                              • Opcode ID: 641fdf70fc5fd849596d377ce77ab3dabaa6fb90976be0f55b5d9298fa6330d2
                                                              • Instruction ID: dfd068cc5c7b936f481eb233ecc1e4ea3f0277fe1584d5b1ddf4d427e9fca770
                                                              • Opcode Fuzzy Hash: 641fdf70fc5fd849596d377ce77ab3dabaa6fb90976be0f55b5d9298fa6330d2
                                                              • Instruction Fuzzy Hash: 30318375A00249DFDB11EB68D889ABDB7B8FF8E300F148115F906EB291D7789E41C791
                                                              APIs
                                                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 0079B98C
                                                              • GetDlgCtrlID.USER32 ref: 0079B997
                                                              • GetParent.USER32 ref: 0079B9B3
                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 0079B9B6
                                                              • GetDlgCtrlID.USER32(?), ref: 0079B9BF
                                                              • GetParent.USER32(?), ref: 0079B9DB
                                                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 0079B9DE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CtrlParent
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 1383977212-1403004172
                                                              • Opcode ID: 2a67cf326b2052a2c933187b8a3f59a94958699f276b7d128a348f7bc09a4964
                                                              • Instruction ID: 62ca6171641b66143ef631624dacbfbfa8b09fa31de4b6da8cdcad5aa98a23ba
                                                              • Opcode Fuzzy Hash: 2a67cf326b2052a2c933187b8a3f59a94958699f276b7d128a348f7bc09a4964
                                                              • Instruction Fuzzy Hash: AC21C4B4900104EFCF05ABA4EC85EFEB775EF49310B104115F96197291DB7D58159B20
                                                              APIs
                                                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 0079BA73
                                                              • GetDlgCtrlID.USER32 ref: 0079BA7E
                                                              • GetParent.USER32 ref: 0079BA9A
                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 0079BA9D
                                                              • GetDlgCtrlID.USER32(?), ref: 0079BAA6
                                                              • GetParent.USER32(?), ref: 0079BAC2
                                                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 0079BAC5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CtrlParent
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 1383977212-1403004172
                                                              • Opcode ID: cc083cb23789c43bf8773a4f0c3a928c7f07497b576cddfc3093b86e4fe0f81a
                                                              • Instruction ID: 0857a19613624f7d852e319772c5f8c65432215b82715e748e705563331e6ad0
                                                              • Opcode Fuzzy Hash: cc083cb23789c43bf8773a4f0c3a928c7f07497b576cddfc3093b86e4fe0f81a
                                                              • Instruction Fuzzy Hash: 7421C5B4900104BFDF11ABA4DC85EFEB779EF49300F108015F95597291DB7D59299B24
                                                              APIs
                                                              • GetParent.USER32 ref: 0079BAE3
                                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 0079BAF8
                                                              • _wcscmp.LIBCMT ref: 0079BB0A
                                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0079BB85
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ClassMessageNameParentSend_wcscmp
                                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                              • API String ID: 1704125052-3381328864
                                                              • Opcode ID: 7126b3e9902d0ead27d426c08f700a9a5934ddc9afbc30f5b80f7e3d242373f5
                                                              • Instruction ID: 8be84a89724fa521e20c0714cb0ec8d9a6601d6ec147888ce51b3a9a61792b9d
                                                              • Opcode Fuzzy Hash: 7126b3e9902d0ead27d426c08f700a9a5934ddc9afbc30f5b80f7e3d242373f5
                                                              • Instruction Fuzzy Hash: 921136B6248303FAFE207634FC0ACA6379CEF14324B204022FA14E40D5EBAD68614654
                                                              APIs
                                                              • VariantInit.OLEAUT32(?), ref: 007BB2D5
                                                              • CoInitialize.OLE32(00000000), ref: 007BB302
                                                              • CoUninitialize.OLE32 ref: 007BB30C
                                                              • GetRunningObjectTable.OLE32(00000000,?), ref: 007BB40C
                                                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 007BB539
                                                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 007BB56D
                                                              • CoGetObject.OLE32(?,00000000,007ED91C,?), ref: 007BB590
                                                              • SetErrorMode.KERNEL32(00000000), ref: 007BB5A3
                                                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 007BB623
                                                              • VariantClear.OLEAUT32(007ED91C), ref: 007BB633
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                              • String ID:
                                                              • API String ID: 2395222682-0
                                                              • Opcode ID: bd455ab090b4609cc3e904b88653e54d4a30580d6389a9f59c8da15e55e962a3
                                                              • Instruction ID: 04d20b153625fca9c09dcfa80ed989613ac10f0b17a3d723e976e4de0396570f
                                                              • Opcode Fuzzy Hash: bd455ab090b4609cc3e904b88653e54d4a30580d6389a9f59c8da15e55e962a3
                                                              • Instruction Fuzzy Hash: 13C125B1608344AFC710DF65C888A6AB7E9FF88344F00491DF98ADB251DBB9ED05CB52
                                                              APIs
                                                              • __lock.LIBCMT ref: 0078ACC1
                                                                • Part of subcall function 00787CF4: __mtinitlocknum.LIBCMT ref: 00787D06
                                                                • Part of subcall function 00787CF4: EnterCriticalSection.KERNEL32(00000000,?,00787ADD,0000000D), ref: 00787D1F
                                                              • __calloc_crt.LIBCMT ref: 0078ACD2
                                                                • Part of subcall function 00786986: __calloc_impl.LIBCMT ref: 00786995
                                                                • Part of subcall function 00786986: Sleep.KERNEL32(00000000,000003BC,0077F507,?,0000000E), ref: 007869AC
                                                              • @_EH4_CallFilterFunc@8.LIBCMT ref: 0078ACED
                                                              • GetStartupInfoW.KERNEL32(?,00816E28,00000064,00785E91,00816C70,00000014), ref: 0078AD46
                                                              • __calloc_crt.LIBCMT ref: 0078AD91
                                                              • GetFileType.KERNEL32(00000001), ref: 0078ADD8
                                                              • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 0078AE11
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                              • String ID:
                                                              • API String ID: 1426640281-0
                                                              • Opcode ID: 82f8c4ae8502c0dde7b84ae9afd445eb0195a639c65e81d34eb4f1d8982f4edf
                                                              • Instruction ID: 560e9ce0d557ec57769f16f2fdbc245396283825d02df9c452647295e5a35f80
                                                              • Opcode Fuzzy Hash: 82f8c4ae8502c0dde7b84ae9afd445eb0195a639c65e81d34eb4f1d8982f4edf
                                                              • Instruction Fuzzy Hash: 2A81D370945341EFEB24DF68C8855A9BBF0FF09320B24865ED4A6AB3D1D7389843CB56
                                                              APIs
                                                              • __swprintf.LIBCMT ref: 007A67FD
                                                              • __swprintf.LIBCMT ref: 007A680A
                                                                • Part of subcall function 0078172B: __woutput_l.LIBCMT ref: 00781784
                                                              • FindResourceW.KERNEL32(?,?,0000000E), ref: 007A6834
                                                              • LoadResource.KERNEL32(?,00000000), ref: 007A6840
                                                              • LockResource.KERNEL32(00000000), ref: 007A684D
                                                              • FindResourceW.KERNEL32(?,?,00000003), ref: 007A686D
                                                              • LoadResource.KERNEL32(?,00000000), ref: 007A687F
                                                              • SizeofResource.KERNEL32(?,00000000), ref: 007A688E
                                                              • LockResource.KERNEL32(?), ref: 007A689A
                                                              • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 007A68F9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                              • String ID:
                                                              • API String ID: 1433390588-0
                                                              • Opcode ID: 7c7d47f86b4929d399f14ad4b8419d926a1c12214e4d41683e9ba8c3666975df
                                                              • Instruction ID: d5d5bdeddc94cbad1798c257908ddd5531b0e31d23ea3d2da2c967c3db1e9435
                                                              • Opcode Fuzzy Hash: 7c7d47f86b4929d399f14ad4b8419d926a1c12214e4d41683e9ba8c3666975df
                                                              • Instruction Fuzzy Hash: 2A31AE7190125AEBDB20AFA0DC89ABB7BACFF49340B148525FA02D6140E73CDD11DBA4
                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 007A4047
                                                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,007A30A5,?,00000001), ref: 007A405B
                                                              • GetWindowThreadProcessId.USER32(00000000), ref: 007A4062
                                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007A30A5,?,00000001), ref: 007A4071
                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 007A4083
                                                              • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,007A30A5,?,00000001), ref: 007A409C
                                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007A30A5,?,00000001), ref: 007A40AE
                                                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,007A30A5,?,00000001), ref: 007A40F3
                                                              • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,007A30A5,?,00000001), ref: 007A4108
                                                              • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,007A30A5,?,00000001), ref: 007A4113
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                              • String ID:
                                                              • API String ID: 2156557900-0
                                                              • Opcode ID: bc0c676018bd08dec13e18baee3438584953eb40641dabf619cbea9fecc762a8
                                                              • Instruction ID: e7878b305b9eb653e787d8337b04af673b0bcc4f43212dbcc4140956fec77bcb
                                                              • Opcode Fuzzy Hash: bc0c676018bd08dec13e18baee3438584953eb40641dabf619cbea9fecc762a8
                                                              • Instruction Fuzzy Hash: 41319371500208AFDB31DF54DC89B6A77B9BBE5351F10C21AF904DA290CBFE9D818B64
                                                              APIs
                                                              • GetSysColor.USER32(00000008), ref: 0077B496
                                                              • SetTextColor.GDI32(?,000000FF), ref: 0077B4A0
                                                              • SetBkMode.GDI32(?,00000001), ref: 0077B4B5
                                                              • GetStockObject.GDI32(00000005), ref: 0077B4BD
                                                              • GetClientRect.USER32(?), ref: 007DDD63
                                                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 007DDD7A
                                                              • GetWindowDC.USER32(?), ref: 007DDD86
                                                              • GetPixel.GDI32(00000000,?,?), ref: 007DDD95
                                                              • ReleaseDC.USER32(?,00000000), ref: 007DDDA7
                                                              • GetSysColor.USER32(00000005), ref: 007DDDC5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                              • String ID:
                                                              • API String ID: 3430376129-0
                                                              • Opcode ID: b2a71052ab0cd1fac0d4321965784db2b75a1d4a80fab83368629168ce353d31
                                                              • Instruction ID: 69c0c09bdf16f76811b5c775d57c97a6ff1c741bdd8a29a1c667576246b44144
                                                              • Opcode Fuzzy Hash: b2a71052ab0cd1fac0d4321965784db2b75a1d4a80fab83368629168ce353d31
                                                              • Instruction Fuzzy Hash: A2117C31101285EFDF316FA4EC88BA93B71EB08365F11C225FA6A990E1DB7A0D51DB20
                                                              APIs
                                                              • EnumChildWindows.USER32(?,0079CF50), ref: 0079CE90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ChildEnumWindows
                                                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                              • API String ID: 3555792229-1603158881
                                                              • Opcode ID: 5a50c355698dfc52c1837e79f6cb1d1283605ea97ea7f0067aa03127e00ee526
                                                              • Instruction ID: 87444a5d185c378f59189c770b95755cbba94852ac5fa207ce99b684b000fd8f
                                                              • Opcode Fuzzy Hash: 5a50c355698dfc52c1837e79f6cb1d1283605ea97ea7f0067aa03127e00ee526
                                                              • Instruction Fuzzy Hash: 4591A230A04106EBDF1ADFA0D485BEAFB79FF04340F508559E94AA7141DF38699ACBE0
                                                              APIs
                                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 007630DC
                                                              • CoUninitialize.OLE32(?,00000000), ref: 00763181
                                                              • UnregisterHotKey.USER32(?), ref: 007632A9
                                                              • DestroyWindow.USER32(?), ref: 007D5079
                                                              • FreeLibrary.KERNEL32(?), ref: 007D50F8
                                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 007D5125
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                              • String ID: close all
                                                              • API String ID: 469580280-3243417748
                                                              • Opcode ID: 7cb429dd83f8955a315faf49a9a9c1227b4cc9815bedc0ace4df46362f501eb0
                                                              • Instruction ID: aa8d07e411a876f7d8365106e95a6128bef1bc04ef757d353f120164b5db68eb
                                                              • Opcode Fuzzy Hash: 7cb429dd83f8955a315faf49a9a9c1227b4cc9815bedc0ace4df46362f501eb0
                                                              • Instruction Fuzzy Hash: 80912B74600246CFC719EF24C999A68F3B4FF15304F5482A9E90BA7262DF38AE56CF54
                                                              APIs
                                                              • SetWindowLongW.USER32(?,000000EB), ref: 0077CC15
                                                                • Part of subcall function 0077CCCD: GetClientRect.USER32(?,?), ref: 0077CCF6
                                                                • Part of subcall function 0077CCCD: GetWindowRect.USER32(?,?), ref: 0077CD37
                                                                • Part of subcall function 0077CCCD: ScreenToClient.USER32(?,?), ref: 0077CD5F
                                                              • GetDC.USER32 ref: 007DD137
                                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 007DD14A
                                                              • SelectObject.GDI32(00000000,00000000), ref: 007DD158
                                                              • SelectObject.GDI32(00000000,00000000), ref: 007DD16D
                                                              • ReleaseDC.USER32(?,00000000), ref: 007DD175
                                                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 007DD200
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                              • String ID: U
                                                              • API String ID: 4009187628-3372436214
                                                              • Opcode ID: 3a559c0262d24c18a1b42bef588a8d4e4ff415d1ba408ec3db221b29e4c1672c
                                                              • Instruction ID: 943d7e7cb037e5a452cc0dbb4dc190f1a01857217d8d25b44219bc9fcea80f2b
                                                              • Opcode Fuzzy Hash: 3a559c0262d24c18a1b42bef588a8d4e4ff415d1ba408ec3db221b29e4c1672c
                                                              • Instruction Fuzzy Hash: 7971D030400209DFCF329F64CC85AEA7BB5FF59354F24826AED595A2A6C7399C41DF60
                                                              APIs
                                                                • Part of subcall function 0077B34E: GetWindowLongW.USER32(?,000000EB), ref: 0077B35F
                                                                • Part of subcall function 0077B63C: GetCursorPos.USER32(000000FF), ref: 0077B64F
                                                                • Part of subcall function 0077B63C: ScreenToClient.USER32(00000000,000000FF), ref: 0077B66C
                                                                • Part of subcall function 0077B63C: GetAsyncKeyState.USER32(00000001), ref: 0077B691
                                                                • Part of subcall function 0077B63C: GetAsyncKeyState.USER32(00000002), ref: 0077B69F
                                                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 007CED3C
                                                              • ImageList_EndDrag.COMCTL32 ref: 007CED42
                                                              • ReleaseCapture.USER32 ref: 007CED48
                                                              • SetWindowTextW.USER32(?,00000000), ref: 007CEDF0
                                                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 007CEE03
                                                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 007CEEDC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                              • API String ID: 1924731296-2107944366
                                                              • Opcode ID: a401421970a97ab40ab6a9251c564a5d0b2a03cb7f3bc2833c0d9af258821c10
                                                              • Instruction ID: ce4f16c343e431689965dfe7036b0b33449abf5d17dbb02afaa06287bcba1c90
                                                              • Opcode Fuzzy Hash: a401421970a97ab40ab6a9251c564a5d0b2a03cb7f3bc2833c0d9af258821c10
                                                              • Instruction Fuzzy Hash: D9518A70204304EFDB20DF20DC9AF6A77E5FB98704F10892DF995972A2DB799948CB52
                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,007FDC00), ref: 007BB715
                                                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,007FDC00), ref: 007BB749
                                                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 007BB8C1
                                                              • SysFreeString.OLEAUT32(?), ref: 007BB8EB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                              • String ID:
                                                              • API String ID: 560350794-0
                                                              • Opcode ID: 571f2959e41dd00161c3c22aacb8137780620840db609000e4b0a44ba23b8069
                                                              • Instruction ID: ad8fae6d222fa0be75387a99dd9f4c48efbd8873bd2e689736978126dcf8a6d9
                                                              • Opcode Fuzzy Hash: 571f2959e41dd00161c3c22aacb8137780620840db609000e4b0a44ba23b8069
                                                              • Instruction Fuzzy Hash: 16F11875A00209EFCB14DFA4C888EEEB7B9FF89315F108459F905AB250DB75AE45CB90
                                                              APIs
                                                              • _memset.LIBCMT ref: 007C24F5
                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007C2688
                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007C26AC
                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007C26EC
                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007C270E
                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007C286F
                                                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 007C28A1
                                                              • CloseHandle.KERNEL32(?), ref: 007C28D0
                                                              • CloseHandle.KERNEL32(?), ref: 007C2947
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                              • String ID:
                                                              • API String ID: 4090791747-0
                                                              • Opcode ID: 0c9178922e228ae22c41d4c65868535c8ec9bc37c0c4451edd8c963e8fdfd29d
                                                              • Instruction ID: df443bd5b12a8c3007621050b02fd98d7a2db91a01902aace449529c406d89c0
                                                              • Opcode Fuzzy Hash: 0c9178922e228ae22c41d4c65868535c8ec9bc37c0c4451edd8c963e8fdfd29d
                                                              • Instruction Fuzzy Hash: F6D1AE31604200DFCB15EF24C895F6ABBE5BF89310F14855DF98A9B2A2DB39EC45CB52
                                                              APIs
                                                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 007CB3F4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: InvalidateRect
                                                              • String ID:
                                                              • API String ID: 634782764-0
                                                              • Opcode ID: a0f6e7706f115f0ad53423a998b4ddd36a9484b14d5dfba9f10ef0841bcfaa04
                                                              • Instruction ID: ce35e64a29d19f298b1e744d7cb02db816a251e5309ac9eacc98c6ce291d9ec3
                                                              • Opcode Fuzzy Hash: a0f6e7706f115f0ad53423a998b4ddd36a9484b14d5dfba9f10ef0841bcfaa04
                                                              • Instruction Fuzzy Hash: 76519D30600284FBEF349B289CCAFAD3B64FB05364F64801EFA15D61E2D779E9548A51
                                                              APIs
                                                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 007DDB1B
                                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 007DDB3C
                                                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 007DDB51
                                                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 007DDB6E
                                                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 007DDB95
                                                              • DestroyIcon.USER32(00000000,?,?,?,?,?,?,0077A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 007DDBA0
                                                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 007DDBBD
                                                              • DestroyIcon.USER32(00000000,?,?,?,?,?,?,0077A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 007DDBC8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                              • String ID:
                                                              • API String ID: 1268354404-0
                                                              • Opcode ID: 38bd36fb7e642944aea66c7cee4788b91bb238ab7bbf935aac963a03adc4dc3b
                                                              • Instruction ID: c1b9354296602710475001dcb365edca31b83991a5047c21a7f011f185a57587
                                                              • Opcode Fuzzy Hash: 38bd36fb7e642944aea66c7cee4788b91bb238ab7bbf935aac963a03adc4dc3b
                                                              • Instruction Fuzzy Hash: FE516D70600209EFEF24DF64CC85FAE77B5FB98794F108519F94A96290D7B8AD80DB90
                                                              APIs
                                                                • Part of subcall function 007A6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007A5FA6,?), ref: 007A6ED8
                                                                • Part of subcall function 007A6EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007A5FA6,?), ref: 007A6EF1
                                                                • Part of subcall function 007A72CB: GetFileAttributesW.KERNEL32(?,007A6019), ref: 007A72CC
                                                              • lstrcmpiW.KERNEL32(?,?), ref: 007A75CA
                                                              • _wcscmp.LIBCMT ref: 007A75E2
                                                              • MoveFileW.KERNEL32(?,?), ref: 007A75FB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                              • String ID:
                                                              • API String ID: 793581249-0
                                                              • Opcode ID: b06048cf5e7dc36f37f3dc6ce71c9badb3894dd1b30e30c3bc2b461501d8f0c7
                                                              • Instruction ID: 6e72ad957058fcd6c1120182ab7e96bda9845b225e06bd54fe105cff784b105e
                                                              • Opcode Fuzzy Hash: b06048cf5e7dc36f37f3dc6ce71c9badb3894dd1b30e30c3bc2b461501d8f0c7
                                                              • Instruction Fuzzy Hash: 225151B2A492199EDF54EB94DC45DDE73BCAF49310B00419AF605E3041EA78D6C9CB70
                                                              APIs
                                                              • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,007DDAD1,00000004,00000000,00000000), ref: 0077EAEB
                                                              • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,007DDAD1,00000004,00000000,00000000), ref: 0077EB32
                                                              • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,007DDAD1,00000004,00000000,00000000), ref: 007DDC86
                                                              • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,007DDAD1,00000004,00000000,00000000), ref: 007DDCF2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ShowWindow
                                                              • String ID:
                                                              • API String ID: 1268545403-0
                                                              • Opcode ID: 540e8b88ac3e252de3c7f2c6c049d7b028fc91ad4116af6bfba489157e878294
                                                              • Instruction ID: 1d9941f601834e3dd67391b63b612bbb43dcb0ac41da71d623ce6a045f46e64c
                                                              • Opcode Fuzzy Hash: 540e8b88ac3e252de3c7f2c6c049d7b028fc91ad4116af6bfba489157e878294
                                                              • Instruction Fuzzy Hash: BE41C5B02152809EDF3547288DCDE3A7EA6AB5D384F19C49AE08F86A71D67D6C80D721
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0079AEF1,00000B00,?,?), ref: 0079B26C
                                                              • HeapAlloc.KERNEL32(00000000,?,0079AEF1,00000B00,?,?), ref: 0079B273
                                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0079AEF1,00000B00,?,?), ref: 0079B288
                                                              • GetCurrentProcess.KERNEL32(?,00000000,?,0079AEF1,00000B00,?,?), ref: 0079B290
                                                              • DuplicateHandle.KERNEL32(00000000,?,0079AEF1,00000B00,?,?), ref: 0079B293
                                                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0079AEF1,00000B00,?,?), ref: 0079B2A3
                                                              • GetCurrentProcess.KERNEL32(0079AEF1,00000000,?,0079AEF1,00000B00,?,?), ref: 0079B2AB
                                                              • DuplicateHandle.KERNEL32(00000000,?,0079AEF1,00000B00,?,?), ref: 0079B2AE
                                                              • CreateThread.KERNEL32(00000000,00000000,0079B2D4,00000000,00000000,00000000), ref: 0079B2C8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                              • String ID:
                                                              • API String ID: 1957940570-0
                                                              • Opcode ID: 1d1e62a1ca3d5ec6d67a70ee0aaeda76bd297f9506a8d3d1e3804f52fe3fe428
                                                              • Instruction ID: 801f6d76d1fea561fd49ce1ba90a45c44054b54ecdd5cf08540f944bf03c608a
                                                              • Opcode Fuzzy Hash: 1d1e62a1ca3d5ec6d67a70ee0aaeda76bd297f9506a8d3d1e3804f52fe3fe428
                                                              • Instruction Fuzzy Hash: 9201BFB5241348BFE720ABA5DD8DF5B7BACEB88711F018411FA15DF191C6B59C00CB65
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: NULL Pointer assignment$Not an Object type
                                                              • API String ID: 0-572801152
                                                              • Opcode ID: 725aa44e9225a7caa9be6bfbd0e8c8aff804fbee0d8dbda4d7ea8b7bf93139a5
                                                              • Instruction ID: ce1c3414fca8ca9e9a4f5d7de1d49e2f2ccf896c86906221068d00fcb296743f
                                                              • Opcode Fuzzy Hash: 725aa44e9225a7caa9be6bfbd0e8c8aff804fbee0d8dbda4d7ea8b7bf93139a5
                                                              • Instruction Fuzzy Hash: 0FE1A071A00219AFDF25DFA8D885BEE77B9EF48314F14C029F905AB281D778AD41CB90
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Variant$ClearInit$_memset
                                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                              • API String ID: 2862541840-625585964
                                                              • Opcode ID: fc43785b17060f3885f3ed73a0a4055f728bbb0bd2c08816393cd20797747a8d
                                                              • Instruction ID: 9c3e2273eaa1dd5019c64ac4e2d79ab144e80c5ad14e7ecbd467e208a1c7ba9c
                                                              • Opcode Fuzzy Hash: fc43785b17060f3885f3ed73a0a4055f728bbb0bd2c08816393cd20797747a8d
                                                              • Instruction Fuzzy Hash: 01918271A00215EBDF24CF95CC48FEEBBB8EF45710F108559F915AB281DBB89945CBA0
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _memset
                                                              • String ID: Q\E$[$\$\$]$^
                                                              • API String ID: 2102423945-1026548749
                                                              • Opcode ID: 072553f0e3d83bbaecb3b2e34986da20f27135e9f53568d5983da571004a2429
                                                              • Instruction ID: 6215f4353eb6166bd35955e596645980ce4525b4e8628d58368cde9eead189b6
                                                              • Opcode Fuzzy Hash: 072553f0e3d83bbaecb3b2e34986da20f27135e9f53568d5983da571004a2429
                                                              • Instruction Fuzzy Hash: ED518171E00249DBDF64CF98C8816ADB7B1FF94314F28826AD81AB7351E7389D85CB91
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 007C9B19
                                                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 007C9B2D
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 007C9B47
                                                              • _wcscat.LIBCMT ref: 007C9BA2
                                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 007C9BB9
                                                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 007C9BE7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window_wcscat
                                                              • String ID: SysListView32
                                                              • API String ID: 307300125-78025650
                                                              • Opcode ID: 0e6661ed2e890d164f58270ebc8a4779de95d672a13cb1cb31e3a4eb41a5ee91
                                                              • Instruction ID: 4423c7f721b9f66bee7c7832ddb55d3b2e2954dcd69365111a7e838576a9fedf
                                                              • Opcode Fuzzy Hash: 0e6661ed2e890d164f58270ebc8a4779de95d672a13cb1cb31e3a4eb41a5ee91
                                                              • Instruction Fuzzy Hash: 1E416D71A40248ABDB219FA4DC89FEE77A8EF08350F10442EF649A7291D6799D84CB64
                                                              APIs
                                                                • Part of subcall function 007A6532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 007A6554
                                                                • Part of subcall function 007A6532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 007A6564
                                                                • Part of subcall function 007A6532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 007A65F9
                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007C179A
                                                              • GetLastError.KERNEL32 ref: 007C17AD
                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007C17D9
                                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 007C1855
                                                              • GetLastError.KERNEL32(00000000), ref: 007C1860
                                                              • CloseHandle.KERNEL32(00000000), ref: 007C1895
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                              • String ID: SeDebugPrivilege
                                                              • API String ID: 2533919879-2896544425
                                                              • Opcode ID: a714788e6d355d7bfab0bd5cd5a35f8b7f92e120fdf02289e22d27448678ea4a
                                                              • Instruction ID: 31a6b8a1402149de9548a857a1302663eaba4e2ce238605b05c8d752709271ed
                                                              • Opcode Fuzzy Hash: a714788e6d355d7bfab0bd5cd5a35f8b7f92e120fdf02289e22d27448678ea4a
                                                              • Instruction Fuzzy Hash: 1A418972600200EFDB16EF54C8A9F6DB7E5AF59310F05806CF9069F282DB7DA9058B95
                                                              APIs
                                                              • LoadIconW.USER32(00000000,00007F03), ref: 007A58B8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: IconLoad
                                                              • String ID: blank$info$question$stop$warning
                                                              • API String ID: 2457776203-404129466
                                                              • Opcode ID: 94cdf08bdd3fcba11392b3f2c6183e373e4a9dd6cefc5931115cd6912b2c52f1
                                                              • Instruction ID: 809ea1adc28f0935743731884315bff4ce20ab460a478afc9fa40eb7dca462c0
                                                              • Opcode Fuzzy Hash: 94cdf08bdd3fcba11392b3f2c6183e373e4a9dd6cefc5931115cd6912b2c52f1
                                                              • Instruction Fuzzy Hash: D1110A32349742FAE7115B559C82DAE339CEF67324F20013AF611E6281E7ACAA4043A8
                                                              APIs
                                                              • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 007AA806
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ArraySafeVartype
                                                              • String ID:
                                                              • API String ID: 1725837607-0
                                                              • Opcode ID: 8569a5bef72a5adbf187f2e3f0ceb1ad36849e0b6034c6d6fb93e79ebfb3aba4
                                                              • Instruction ID: dc98ae3fa8fb7b28e1d33f647a987eb55fda360608c1c1df1110ebc8e51adddb
                                                              • Opcode Fuzzy Hash: 8569a5bef72a5adbf187f2e3f0ceb1ad36849e0b6034c6d6fb93e79ebfb3aba4
                                                              • Instruction Fuzzy Hash: 0EC1AF75A0121AEFDB14CF98C485BAEB7F4FF4A311F20816AE605EB241D738AD41CB91
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 007A6B63
                                                              • LoadStringW.USER32(00000000), ref: 007A6B6A
                                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 007A6B80
                                                              • LoadStringW.USER32(00000000), ref: 007A6B87
                                                              • _wprintf.LIBCMT ref: 007A6BAD
                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007A6BCB
                                                              Strings
                                                              • %s (%d) : ==> %s: %s %s, xrefs: 007A6BA8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadModuleString$Message_wprintf
                                                              • String ID: %s (%d) : ==> %s: %s %s
                                                              • API String ID: 3648134473-3128320259
                                                              • Opcode ID: 18b213673cf5793fccd56c1eab2469116d28934ac82707cc7334ce1d7fa3fa40
                                                              • Instruction ID: 4dfbfc028855cefc02dbf26c91706ffa8d023ed03b06af70d6261aa23d07f1a9
                                                              • Opcode Fuzzy Hash: 18b213673cf5793fccd56c1eab2469116d28934ac82707cc7334ce1d7fa3fa40
                                                              • Instruction Fuzzy Hash: 650136F6500248BFEB21A7949DC9EF7776CD70C304F0085A5B755D6141EA789E848F74
                                                              APIs
                                                                • Part of subcall function 007C3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C2BB5,?,?), ref: 007C3C1D
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C2BF6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: BuffCharConnectRegistryUpper
                                                              • String ID:
                                                              • API String ID: 2595220575-0
                                                              • Opcode ID: ef5a9ba0e7846c4e90878db7cb85b9aa0a9cb57ba2fddd5cd5077d4d0b8a7ff8
                                                              • Instruction ID: cc49ff11ea5e7b0cdf9a4f568898410e0db792a12b6ed8bda011e5a188ea49f2
                                                              • Opcode Fuzzy Hash: ef5a9ba0e7846c4e90878db7cb85b9aa0a9cb57ba2fddd5cd5077d4d0b8a7ff8
                                                              • Instruction Fuzzy Hash: BE916B71604201EFCB11EF14C895F6EB7E5EF98310F04885DF99A9B292DB39E906CB52
                                                              APIs
                                                              • select.WSOCK32 ref: 007B9691
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 007B969E
                                                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 007B96C8
                                                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 007B96E9
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 007B96F8
                                                              • htons.WSOCK32(?,?,?,00000000,?), ref: 007B97AA
                                                              • inet_ntoa.WSOCK32(?,?,?,?,?,?,?,?,?,?,?,?,007FDC00), ref: 007B9765
                                                                • Part of subcall function 0079D2FF: _strlen.LIBCMT ref: 0079D309
                                                              • _strlen.LIBCMT ref: 007B9800
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast_strlen$htonsinet_ntoaselect
                                                              • String ID:
                                                              • API String ID: 3480843537-0
                                                              • Opcode ID: a52e500f16aaeec805f93b845d26dac5cdbc58705a3f165a47f7b8a24656a969
                                                              • Instruction ID: 804dc86fdbaec33ce2ec8d79630118450ae38f1853c8c838ab3418d61d59c3ef
                                                              • Opcode Fuzzy Hash: a52e500f16aaeec805f93b845d26dac5cdbc58705a3f165a47f7b8a24656a969
                                                              • Instruction Fuzzy Hash: F181AF71504240EFC724EF64CC89FABB7E8EB89714F104619FA5A9B1A1EB38DD04CB91
                                                              APIs
                                                              • __mtinitlocknum.LIBCMT ref: 0078A991
                                                                • Part of subcall function 00787D7C: __FF_MSGBANNER.LIBCMT ref: 00787D91
                                                                • Part of subcall function 00787D7C: __NMSG_WRITE.LIBCMT ref: 00787D98
                                                                • Part of subcall function 00787D7C: __malloc_crt.LIBCMT ref: 00787DB8
                                                              • __lock.LIBCMT ref: 0078A9A4
                                                              • __lock.LIBCMT ref: 0078A9F0
                                                              • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,00816DE0,00000018,00795E7B,?,00000000,00000109), ref: 0078AA0C
                                                              • EnterCriticalSection.KERNEL32(8000000C,00816DE0,00000018,00795E7B,?,00000000,00000109), ref: 0078AA29
                                                              • LeaveCriticalSection.KERNEL32(8000000C), ref: 0078AA39
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                              • String ID:
                                                              • API String ID: 1422805418-0
                                                              • Opcode ID: 720ff564c0104e9b911183a296da3087c9a41d966691f3c23f4e2d4a0ae402f7
                                                              • Instruction ID: 8fc15efc1602e6709d93718e18158ac499eb8bae84e1117f1e622c7262d76b0f
                                                              • Opcode Fuzzy Hash: 720ff564c0104e9b911183a296da3087c9a41d966691f3c23f4e2d4a0ae402f7
                                                              • Instruction Fuzzy Hash: A2411C71980205EBFB28AF68D94475CBBA0BF05335F10C21AE425AF6D1D77D9941CB93
                                                              APIs
                                                              • DeleteObject.GDI32(00000000), ref: 007C8EE4
                                                              • GetDC.USER32(00000000), ref: 007C8EEC
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007C8EF7
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 007C8F03
                                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 007C8F3F
                                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 007C8F50
                                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,007CBD19,?,?,000000FF,00000000,?,000000FF,?), ref: 007C8F8A
                                                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 007C8FAA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                              • String ID:
                                                              • API String ID: 3864802216-0
                                                              • Opcode ID: 9d6fd5fe435e6cf1a20bb086d321405b537796a37a7517542a829f8987c48cb6
                                                              • Instruction ID: 526de7e580c0f0164412b00a862af31aaa1381b12bd02ce257d1d085c1a0989a
                                                              • Opcode Fuzzy Hash: 9d6fd5fe435e6cf1a20bb086d321405b537796a37a7517542a829f8987c48cb6
                                                              • Instruction Fuzzy Hash: B4314D72101254BFEB218F50CC89FEA3BA9EF49755F084069FE099E191D6B99C41CB74
                                                              APIs
                                                                • Part of subcall function 0076936C: __swprintf.LIBCMT ref: 007693AB
                                                                • Part of subcall function 0076936C: __itow.LIBCMT ref: 007693DF
                                                                • Part of subcall function 0077C6F4: _wcscpy.LIBCMT ref: 0077C717
                                                              • _wcstok.LIBCMT ref: 007B184E
                                                              • _wcscpy.LIBCMT ref: 007B18DD
                                                              • _memset.LIBCMT ref: 007B1910
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                              • String ID: X
                                                              • API String ID: 774024439-3081909835
                                                              • Opcode ID: ec1f98e86698077b83f3eb8ac4b0bab565a896bfc836f8a1c7149e86ef0b4d13
                                                              • Instruction ID: edcf1b94f6ddbaab7c341b7552457ef853c34c855f7c771ffa8f38c29b7a364e
                                                              • Opcode Fuzzy Hash: ec1f98e86698077b83f3eb8ac4b0bab565a896bfc836f8a1c7149e86ef0b4d13
                                                              • Instruction Fuzzy Hash: C2C18471604340DFC724EF24C899A9AB7E4FF45350F44892DF99A972A2DB38ED45CB82
                                                              APIs
                                                                • Part of subcall function 0077B34E: GetWindowLongW.USER32(?,000000EB), ref: 0077B35F
                                                              • GetSystemMetrics.USER32(0000000F), ref: 007D016D
                                                              • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 007D038D
                                                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 007D03AB
                                                              • InvalidateRect.USER32(?,00000000,00000001,?), ref: 007D03D6
                                                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 007D03FF
                                                              • ShowWindow.USER32(00000003,00000000), ref: 007D0421
                                                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 007D0440
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
                                                              • String ID:
                                                              • API String ID: 3356174886-0
                                                              • Opcode ID: 17014986bf14b6d0f6f9010028d92397b6b03a85b8ffcab28617d7a98b8da07b
                                                              • Instruction ID: 053f694303994e544ad33132f4f5c851a80f2a68ebda2cd62d52cad5f4864767
                                                              • Opcode Fuzzy Hash: 17014986bf14b6d0f6f9010028d92397b6b03a85b8ffcab28617d7a98b8da07b
                                                              • Instruction Fuzzy Hash: 76A19C35600616EFDB18CF68C9897BEBBB1BF48740F14911AED54AB390D778AD60CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5a246067630dbbcd672308bfaa3dc115ca26f91edbf8cfd65fe44ce1726dd11b
                                                              • Instruction ID: 5d79a740944bfac43640d81e0ed00f5e5f621e7e166f54e71cdedb536e6d4069
                                                              • Opcode Fuzzy Hash: 5a246067630dbbcd672308bfaa3dc115ca26f91edbf8cfd65fe44ce1726dd11b
                                                              • Instruction Fuzzy Hash: 82717AB0900109FFDF15CF98CC89AAEBB74FF89354F24C159F919AA250C338AA01CB65
                                                              APIs
                                                              • _memset.LIBCMT ref: 007C225A
                                                              • _memset.LIBCMT ref: 007C2323
                                                              • ShellExecuteExW.SHELL32(?), ref: 007C2368
                                                                • Part of subcall function 0076936C: __swprintf.LIBCMT ref: 007693AB
                                                                • Part of subcall function 0076936C: __itow.LIBCMT ref: 007693DF
                                                                • Part of subcall function 0077C6F4: _wcscpy.LIBCMT ref: 0077C717
                                                              • CloseHandle.KERNEL32(00000000), ref: 007C242F
                                                              • FreeLibrary.KERNEL32(00000000), ref: 007C243E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                                              • String ID: @
                                                              • API String ID: 4082843840-2766056989
                                                              • Opcode ID: 5f3a308709e4f6be88e2dd251adf786aa179ac7aeda4340cb1ba425e4fbf2e3e
                                                              • Instruction ID: 0a83d603fb50fc3507fabeb7186cc5bbaa07afedb4b96709c7c8295d39249200
                                                              • Opcode Fuzzy Hash: 5f3a308709e4f6be88e2dd251adf786aa179ac7aeda4340cb1ba425e4fbf2e3e
                                                              • Instruction Fuzzy Hash: 67716A74A00619DFCF15EFA4C885A9EB7B5FF48310F10805DE85AAB352DB38AE41CB94
                                                              APIs
                                                              • GetParent.USER32(00000000), ref: 007A3C02
                                                              • GetKeyboardState.USER32(?), ref: 007A3C17
                                                              • SetKeyboardState.USER32(?), ref: 007A3C78
                                                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 007A3CA4
                                                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 007A3CC1
                                                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007A3D05
                                                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007A3D26
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessagePost$KeyboardState$Parent
                                                              • String ID:
                                                              • API String ID: 87235514-0
                                                              • Opcode ID: b0a84791e2b2557111fbd0bd73eb6bf421a7336417465cadb5229815fa02e87c
                                                              • Instruction ID: 0741f2f2f32237656ef343f948e019919828c9b47a30bb4b92956c266531f79a
                                                              • Opcode Fuzzy Hash: b0a84791e2b2557111fbd0bd73eb6bf421a7336417465cadb5229815fa02e87c
                                                              • Instruction Fuzzy Hash: 7F51F9A16047D57DFB324B34CC45BB6BFA95B87300F088689F0D55A8C2D29DEE94E760
                                                              APIs
                                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?), ref: 007C3DA1
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007C3DCB
                                                              • FreeLibrary.KERNEL32(00000000), ref: 007C3E80
                                                                • Part of subcall function 007C3D72: RegCloseKey.ADVAPI32(?), ref: 007C3DE8
                                                                • Part of subcall function 007C3D72: FreeLibrary.KERNEL32(?), ref: 007C3E3A
                                                                • Part of subcall function 007C3D72: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 007C3E5D
                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 007C3E25
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                              • String ID:
                                                              • API String ID: 395352322-0
                                                              • Opcode ID: 73b78ed4cb9fe85b1bc7430bbb224238fbcf494fb881317c07ec33da06478a77
                                                              • Instruction ID: 756e90d434b957d08176f07da27ecd3f6640a94d06e322781580def7b0b87102
                                                              • Opcode Fuzzy Hash: 73b78ed4cb9fe85b1bc7430bbb224238fbcf494fb881317c07ec33da06478a77
                                                              • Instruction Fuzzy Hash: F631EAB1901109BFDB159B94DC89EFFB7BCEB08300F04816EE512A6151E7789F899BA4
                                                              APIs
                                                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 007C8FE7
                                                              • GetWindowLongW.USER32(00D3E1A8,000000F0), ref: 007C901A
                                                              • GetWindowLongW.USER32(00D3E1A8,000000F0), ref: 007C904F
                                                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 007C9081
                                                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 007C90AB
                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 007C90BC
                                                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 007C90D6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: LongWindow$MessageSend
                                                              • String ID:
                                                              • API String ID: 2178440468-0
                                                              • Opcode ID: 0de565594c5d0b462e7677e1778dc6afbe1aa9267ad656b1607381a7115fe470
                                                              • Instruction ID: 8f0d16ff10cf1254e0808db2928ee66610d7a60ce8d7be195af71fc0a8391e84
                                                              • Opcode Fuzzy Hash: 0de565594c5d0b462e7677e1778dc6afbe1aa9267ad656b1607381a7115fe470
                                                              • Instruction Fuzzy Hash: 23313534600216EFDB608F58DC88F6437A6FB5A354F24816CFA198F2B1CB79AC81CB45
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007A08F2
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007A0918
                                                              • SysAllocString.OLEAUT32(00000000), ref: 007A091B
                                                              • SysAllocString.OLEAUT32(?), ref: 007A0939
                                                              • SysFreeString.OLEAUT32(?), ref: 007A0942
                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 007A0967
                                                              • SysAllocString.OLEAUT32(?), ref: 007A0975
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                              • String ID:
                                                              • API String ID: 3761583154-0
                                                              • Opcode ID: 77185d88054a53a1dc142ada7ee383ea5bef63655148fa12c12fc0b9bebf0ed7
                                                              • Instruction ID: 909c6a027609381e909d32693f8f329816ac49883a74f4e4013e6a826835c53d
                                                              • Opcode Fuzzy Hash: 77185d88054a53a1dc142ada7ee383ea5bef63655148fa12c12fc0b9bebf0ed7
                                                              • Instruction Fuzzy Hash: F7216776601219AFAB109F78DC88DAB73ACEB4A360B00C625F919DB151D678EC458BA4
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __wcsnicmp
                                                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                              • API String ID: 1038674560-2734436370
                                                              • Opcode ID: 1aebbbd34f792676c8a454396847e653fb74fa7e77edbe9ea4812d7360e88050
                                                              • Instruction ID: a9d766fb6c1778a20dabb22375e3593f59959bea2be3aab4a077f23a4547c283
                                                              • Opcode Fuzzy Hash: 1aebbbd34f792676c8a454396847e653fb74fa7e77edbe9ea4812d7360e88050
                                                              • Instruction Fuzzy Hash: 8F216A71240251A7C631BB38DC16EBB7399EFEA310F60812AF94AD7143E65D9D53C3A1
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007A09CB
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007A09F1
                                                              • SysAllocString.OLEAUT32(00000000), ref: 007A09F4
                                                              • SysAllocString.OLEAUT32 ref: 007A0A15
                                                              • SysFreeString.OLEAUT32 ref: 007A0A1E
                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 007A0A38
                                                              • SysAllocString.OLEAUT32(?), ref: 007A0A46
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                              • String ID:
                                                              • API String ID: 3761583154-0
                                                              • Opcode ID: 73eeb4bdb19230f99757b3608e5ae09f6caba4ad6dd808668c92300953cc1f16
                                                              • Instruction ID: b41dcd7fa41dbf94eda00585b03a58969217ebfa8ce6d427e8d1c8858bcd6ece
                                                              • Opcode Fuzzy Hash: 73eeb4bdb19230f99757b3608e5ae09f6caba4ad6dd808668c92300953cc1f16
                                                              • Instruction Fuzzy Hash: 4A217475201244AFDB109FB8DC88DAB77ECEF4E360700C625F909CB2A1E678EC418764
                                                              APIs
                                                                • Part of subcall function 0077D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0077D1BA
                                                                • Part of subcall function 0077D17C: GetStockObject.GDI32(00000011), ref: 0077D1CE
                                                                • Part of subcall function 0077D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0077D1D8
                                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 007CA32D
                                                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 007CA33A
                                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 007CA345
                                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 007CA354
                                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 007CA360
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CreateObjectStockWindow
                                                              • String ID: Msctls_Progress32
                                                              • API String ID: 1025951953-3636473452
                                                              • Opcode ID: ec8ebada18a8f0c51589599a3e78d595851b79b1e0fc0b883769a08c12d43d6d
                                                              • Instruction ID: fa2a06636c3cfdeceb85b425b4df8369589c81ffd1604977f699441870195194
                                                              • Opcode Fuzzy Hash: ec8ebada18a8f0c51589599a3e78d595851b79b1e0fc0b883769a08c12d43d6d
                                                              • Instruction Fuzzy Hash: F41193B155011DBEEF115FA0CC85EEB7F6DFF09798F014118BA08A60A0C7769C21DBA4
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 0077CCF6
                                                              • GetWindowRect.USER32(?,?), ref: 0077CD37
                                                              • ScreenToClient.USER32(?,?), ref: 0077CD5F
                                                              • GetClientRect.USER32(?,?), ref: 0077CE8C
                                                              • GetWindowRect.USER32(?,?), ref: 0077CEA5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Rect$Client$Window$Screen
                                                              • String ID:
                                                              • API String ID: 1296646539-0
                                                              • Opcode ID: a0d91c9b45b3783c3c9743b74e12bd0f88de11aeeed6837c59442870b56ac847
                                                              • Instruction ID: 60233030d81cedb779be2a641562ba0b04c86013de15c9c6e1c285684310138a
                                                              • Opcode Fuzzy Hash: a0d91c9b45b3783c3c9743b74e12bd0f88de11aeeed6837c59442870b56ac847
                                                              • Instruction Fuzzy Hash: ECB13A79A00249DBDF11CFA8C5807EDBBB1FF08350F14D56AEC59AB250DB78AA50CB64
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 007C1C18
                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 007C1C26
                                                              • __wsplitpath.LIBCMT ref: 007C1C54
                                                                • Part of subcall function 00781DFC: __wsplitpath_helper.LIBCMT ref: 00781E3C
                                                              • _wcscat.LIBCMT ref: 007C1C69
                                                              • Process32NextW.KERNEL32(00000000,?), ref: 007C1CDF
                                                              • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 007C1CF1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                                              • String ID:
                                                              • API String ID: 1380811348-0
                                                              • Opcode ID: 9a2d41a7d4448fe311d1b8fb1c3845ca0907d7968de1b03bc3ffb1814d4857c3
                                                              • Instruction ID: 3c2b8c733adb792dc407cbf08fa8e3968b85a03312f1a00207dd7a27a73a8bf5
                                                              • Opcode Fuzzy Hash: 9a2d41a7d4448fe311d1b8fb1c3845ca0907d7968de1b03bc3ffb1814d4857c3
                                                              • Instruction Fuzzy Hash: F9514DB1504340DFD721EF24C885EABB7ECEF88754F40492EF98A97251EB749905CBA2
                                                              APIs
                                                                • Part of subcall function 007C3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C2BB5,?,?), ref: 007C3C1D
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C30AF
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007C30EF
                                                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 007C3112
                                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 007C313B
                                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 007C317E
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 007C318B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                              • String ID:
                                                              • API String ID: 3451389628-0
                                                              • Opcode ID: 4a56b22e30fa9628960b94688228257b75ce76369cacdc8597dc98996dda0304
                                                              • Instruction ID: 18ae8073a0028ca52eb926dec433c83451bdc774eba6e9cc65b88097cb1fde88
                                                              • Opcode Fuzzy Hash: 4a56b22e30fa9628960b94688228257b75ce76369cacdc8597dc98996dda0304
                                                              • Instruction Fuzzy Hash: 90516B32614344EFC710EF64C889E6AB7E9FF89300F04891DF98687291DB79EA05CB52
                                                              APIs
                                                              • GetMenu.USER32(?), ref: 007C8540
                                                              • GetMenuItemCount.USER32(00000000), ref: 007C8577
                                                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 007C859F
                                                              • GetMenuItemID.USER32(?,?), ref: 007C860E
                                                              • GetSubMenu.USER32(?,?), ref: 007C861C
                                                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 007C866D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$CountMessagePostString
                                                              • String ID:
                                                              • API String ID: 650687236-0
                                                              • Opcode ID: 03e13aa2f3926a292bb98e21e03e6372d098cf5c08ffc1b74b77e318cd084b27
                                                              • Instruction ID: bd86e4511945f6ec3698118634b2443b51081d1495ca8deac3d0dd663d4f5c4b
                                                              • Opcode Fuzzy Hash: 03e13aa2f3926a292bb98e21e03e6372d098cf5c08ffc1b74b77e318cd084b27
                                                              • Instruction Fuzzy Hash: 3C519B31A00214EFCF51EFA4C885AAEB7F4EF48310F14845DE916BB352DB78AE418B95
                                                              APIs
                                                              • _memset.LIBCMT ref: 007A4B10
                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007A4B5B
                                                              • IsMenu.USER32(00000000), ref: 007A4B7B
                                                              • CreatePopupMenu.USER32 ref: 007A4BAF
                                                              • GetMenuItemCount.USER32(000000FF), ref: 007A4C0D
                                                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 007A4C3E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                              • String ID:
                                                              • API String ID: 3311875123-0
                                                              • Opcode ID: bb05653847dca98cfba9e3673d2b7d28ae4e77ebd02cca373d8b202e9268014c
                                                              • Instruction ID: 95810a45c930765ff6af6dcfe9b2ba27a971e2ce522ac2225e6a253ff3c94f6d
                                                              • Opcode Fuzzy Hash: bb05653847dca98cfba9e3673d2b7d28ae4e77ebd02cca373d8b202e9268014c
                                                              • Instruction Fuzzy Hash: CA51C470601249EFDF24CF64D888BADBBF4AFC6324F144259E4299B291D3FAD944CB61
                                                              APIs
                                                              • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,007FDC00), ref: 007B8E7C
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 007B8E89
                                                              • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 007B8EAD
                                                              • #16.WSOCK32(?,?,00000000,00000000), ref: 007B8EC5
                                                              • _strlen.LIBCMT ref: 007B8EF7
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 007B8F6A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$_strlenselect
                                                              • String ID:
                                                              • API String ID: 2217125717-0
                                                              • Opcode ID: 11fa034fe4841e49c53544bdde79a9baff866ee2e058c3e80afab6e86cf6c30a
                                                              • Instruction ID: b95c06f5e658142b3e5b6a113031a26fc074f3bba1767a456c99a228275f46cf
                                                              • Opcode Fuzzy Hash: 11fa034fe4841e49c53544bdde79a9baff866ee2e058c3e80afab6e86cf6c30a
                                                              • Instruction Fuzzy Hash: B3418E71600104EFCB54EBA4CD99FEEB7BEAB58310F104659F51A97291DF38AE40CB61
                                                              APIs
                                                                • Part of subcall function 0077B34E: GetWindowLongW.USER32(?,000000EB), ref: 0077B35F
                                                              • BeginPaint.USER32(?,?,?), ref: 0077AC2A
                                                              • GetWindowRect.USER32(?,?), ref: 0077AC8E
                                                              • ScreenToClient.USER32(?,?), ref: 0077ACAB
                                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0077ACBC
                                                              • EndPaint.USER32(?,?,?,?,?), ref: 0077AD06
                                                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 007DE673
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                              • String ID:
                                                              • API String ID: 2592858361-0
                                                              • Opcode ID: 93ba71b5253bb7bfd430f66a339814c6bef1090c57f882bc1d8a0bbaa5f10c05
                                                              • Instruction ID: c95cc02e21bee15a667c5f29af178fcfd92c1f0f341b22f93ccc598b9d039431
                                                              • Opcode Fuzzy Hash: 93ba71b5253bb7bfd430f66a339814c6bef1090c57f882bc1d8a0bbaa5f10c05
                                                              • Instruction Fuzzy Hash: A141D671104301AFDB21DF24CC88F7A7BB8FB69360F148669F9588B2A1C3399C45DB62
                                                              APIs
                                                              • ShowWindow.USER32(00821628,00000000,00821628,00000000,00000000,00821628,?,007DDC5D,00000000,?,00000000,00000000,00000000,?,007DDAD1,00000004), ref: 007CE40B
                                                              • EnableWindow.USER32(00000000,00000000), ref: 007CE42F
                                                              • ShowWindow.USER32(00821628,00000000), ref: 007CE48F
                                                              • ShowWindow.USER32(00000000,00000004), ref: 007CE4A1
                                                              • EnableWindow.USER32(00000000,00000001), ref: 007CE4C5
                                                              • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 007CE4E8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$Show$Enable$MessageSend
                                                              • String ID:
                                                              • API String ID: 642888154-0
                                                              • Opcode ID: 74f9a87a8f5914f70f138f8ff812789189488c3a424e4dfe1aa854c850730183
                                                              • Instruction ID: 88175946f9ee767ff6d7e0d75accbfc32b060f9d99656d3ddc71b262812cecb0
                                                              • Opcode Fuzzy Hash: 74f9a87a8f5914f70f138f8ff812789189488c3a424e4dfe1aa854c850730183
                                                              • Instruction Fuzzy Hash: 77413D34601181EFDB2ACF24C499FA47BE1BB09304F5881ADFA598F2A2C779AD41CB51
                                                              APIs
                                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 007A98D1
                                                                • Part of subcall function 0077F4EA: std::exception::exception.LIBCMT ref: 0077F51E
                                                                • Part of subcall function 0077F4EA: __CxxThrowException@8.LIBCMT ref: 0077F533
                                                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 007A9908
                                                              • EnterCriticalSection.KERNEL32(?), ref: 007A9924
                                                              • LeaveCriticalSection.KERNEL32(?), ref: 007A999E
                                                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 007A99B3
                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 007A99D2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                                              • String ID:
                                                              • API String ID: 2537439066-0
                                                              • Opcode ID: 6376fcab5a652730fcfbfc3e051885cbf4f83536df8eae533f2267268bb9a010
                                                              • Instruction ID: 40fae6a6ec05176ba88e3a54058780f8fa3756f5f22bb086ee4c52a3b763803d
                                                              • Opcode Fuzzy Hash: 6376fcab5a652730fcfbfc3e051885cbf4f83536df8eae533f2267268bb9a010
                                                              • Instruction Fuzzy Hash: 87315031A00105EBDF109F94DD89AABB7B8FF85310B1481A9F904AB246D778DE10DBA5
                                                              APIs
                                                              • GetForegroundWindow.USER32(?,?,?,?,?,?,007B77F4,?,?,00000000,00000001), ref: 007B9B53
                                                                • Part of subcall function 007B6544: GetWindowRect.USER32(?,?), ref: 007B6557
                                                              • GetDesktopWindow.USER32 ref: 007B9B7D
                                                              • GetWindowRect.USER32(00000000), ref: 007B9B84
                                                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 007B9BB6
                                                                • Part of subcall function 007A7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 007A7AD0
                                                              • GetCursorPos.USER32(?), ref: 007B9BE2
                                                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007B9C44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                              • String ID:
                                                              • API String ID: 4137160315-0
                                                              • Opcode ID: b61359fdb784556f6eaa1829ca55891e59f4edb782c33c21ad504d294d96f395
                                                              • Instruction ID: eba73b26aa120423ac4316aa75aff7d16ab815a68bf5b2dd47b8850732307ecb
                                                              • Opcode Fuzzy Hash: b61359fdb784556f6eaa1829ca55891e59f4edb782c33c21ad504d294d96f395
                                                              • Instruction Fuzzy Hash: 7031E172204355ABC720DF18DC89F9BB7E9FF89314F00092AF695DB181D635E914CB92
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 0079AFAE
                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 0079AFB5
                                                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 0079AFC4
                                                              • CloseHandle.KERNEL32(00000004), ref: 0079AFCF
                                                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0079AFFE
                                                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 0079B012
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                              • String ID:
                                                              • API String ID: 1413079979-0
                                                              • Opcode ID: 7ffd747882bf996cf0f3f3791113cadddc49a16b57050cfbce732214ee981800
                                                              • Instruction ID: a27ad661fa82301968f7a8de56a0dfdd0f5ad26e0c5ac9b6413e50c4ecc264ed
                                                              • Opcode Fuzzy Hash: 7ffd747882bf996cf0f3f3791113cadddc49a16b57050cfbce732214ee981800
                                                              • Instruction Fuzzy Hash: 67215072102249FFDF118F98ED49F9E7BA9EF48304F148015F901A6161C37ADD11DBA1
                                                              APIs
                                                                • Part of subcall function 0077AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0077AFE3
                                                                • Part of subcall function 0077AF83: SelectObject.GDI32(?,00000000), ref: 0077AFF2
                                                                • Part of subcall function 0077AF83: BeginPath.GDI32(?), ref: 0077B009
                                                                • Part of subcall function 0077AF83: SelectObject.GDI32(?,00000000), ref: 0077B033
                                                              • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 007CEC20
                                                              • LineTo.GDI32(00000000,00000003,?), ref: 007CEC34
                                                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 007CEC42
                                                              • LineTo.GDI32(00000000,00000000,?), ref: 007CEC52
                                                              • EndPath.GDI32(00000000), ref: 007CEC62
                                                              • StrokePath.GDI32(00000000), ref: 007CEC72
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                              • String ID:
                                                              • API String ID: 43455801-0
                                                              • Opcode ID: da3b5c016d29d854c893918f5a9ccfe02fcd862211c6628bc30dbbaae78bf4c7
                                                              • Instruction ID: 4d4fdecd359f15a620a67da0ec8e1d962cfa2c5bf44ef2f493ecfef6203f0ed0
                                                              • Opcode Fuzzy Hash: da3b5c016d29d854c893918f5a9ccfe02fcd862211c6628bc30dbbaae78bf4c7
                                                              • Instruction Fuzzy Hash: 9611097200114DBFEF229F90DC88EEA7F6DEB08360F048126BE089A160D7759D55DBA0
                                                              APIs
                                                              • GetDC.USER32(00000000), ref: 0079E1C0
                                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 0079E1D1
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0079E1D8
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 0079E1E0
                                                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0079E1F7
                                                              • MulDiv.KERNEL32(000009EC,?,?), ref: 0079E209
                                                                • Part of subcall function 00799AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00799A05,00000000,00000000,?,00799DDB), ref: 0079A53A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CapsDevice$ExceptionRaiseRelease
                                                              • String ID:
                                                              • API String ID: 603618608-0
                                                              • Opcode ID: 76865ac9d768429dd2ffbba439ac70c380091e01f1b9623c5f91ecf3b19f7da5
                                                              • Instruction ID: 1ccb44740aeed508e8848f73f5aa7714eea606ab3bb306bfc2aead43205e40b2
                                                              • Opcode Fuzzy Hash: 76865ac9d768429dd2ffbba439ac70c380091e01f1b9623c5f91ecf3b19f7da5
                                                              • Instruction Fuzzy Hash: BE0184B5A40258BFEF109BA59C45B5EBFB9EB48351F048066EA04AB290D6759C00CBA0
                                                              APIs
                                                              • __init_pointers.LIBCMT ref: 00787B47
                                                                • Part of subcall function 0078123A: __initp_misc_winsig.LIBCMT ref: 0078125E
                                                                • Part of subcall function 0078123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00787F51
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00787F65
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00787F78
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00787F8B
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00787F9E
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00787FB1
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00787FC4
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00787FD7
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00787FEA
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00787FFD
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00788010
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00788023
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00788036
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00788049
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0078805C
                                                                • Part of subcall function 0078123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 0078806F
                                                              • __mtinitlocks.LIBCMT ref: 00787B4C
                                                                • Part of subcall function 00787E23: InitializeCriticalSectionAndSpinCount.KERNEL32(0081AC68,00000FA0,?,?,00787B51,00785E77,00816C70,00000014), ref: 00787E41
                                                              • __mtterm.LIBCMT ref: 00787B55
                                                                • Part of subcall function 00787BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00787B5A,00785E77,00816C70,00000014), ref: 00787D3F
                                                                • Part of subcall function 00787BBD: _free.LIBCMT ref: 00787D46
                                                                • Part of subcall function 00787BBD: DeleteCriticalSection.KERNEL32(0081AC68,?,?,00787B5A,00785E77,00816C70,00000014), ref: 00787D68
                                                              • __calloc_crt.LIBCMT ref: 00787B7A
                                                              • GetCurrentThreadId.KERNEL32 ref: 00787BA3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                              • String ID:
                                                              • API String ID: 2942034483-0
                                                              • Opcode ID: 90486ad284bf1bdd111c4f06923624b795f2baed0ff29a253a5ca1e5a31deebc
                                                              • Instruction ID: 276dabc6369ec61c9ae7cca2960c883d83170183999b0f6dfb351851938fe09a
                                                              • Opcode Fuzzy Hash: 90486ad284bf1bdd111c4f06923624b795f2baed0ff29a253a5ca1e5a31deebc
                                                              • Instruction Fuzzy Hash: 38F096B21DD75199E62C77347C0AA4A2B859F01730B3046A9F866C50D1FF2CCC42C365
                                                              APIs
                                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0076281D
                                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00762825
                                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00762830
                                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 0076283B
                                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00762843
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0076284B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Virtual
                                                              • String ID:
                                                              • API String ID: 4278518827-0
                                                              • Opcode ID: 7ddaa800ab54d8d1f6f5e2d5cc63a133c706b9d1a1ea3be12d8d833b0c599d8f
                                                              • Instruction ID: 771e750d900aaf5ae18243bc18f30faa27badc28f2ff2ccec79d25401db6ab94
                                                              • Opcode Fuzzy Hash: 7ddaa800ab54d8d1f6f5e2d5cc63a133c706b9d1a1ea3be12d8d833b0c599d8f
                                                              • Instruction Fuzzy Hash: 2E016CB0902B597DE3008F6A8C85B52FFA8FF19354F00411B915C47941C7F5A864CBE5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                                              • String ID:
                                                              • API String ID: 1423608774-0
                                                              • Opcode ID: 4ff1f16c54493a0cc0e20582713a3f192c8e2ccab9e23692024337feaae5c081
                                                              • Instruction ID: 81e1acea323c4b4edf0e1b47b12fdca44c8a9d02a085c0ac746075674941d2f4
                                                              • Opcode Fuzzy Hash: 4ff1f16c54493a0cc0e20582713a3f192c8e2ccab9e23692024337feaae5c081
                                                              • Instruction Fuzzy Hash: 8D018132203221EBDB251B58EC88DEB7769FFCD701B04862AF7039A0A0DB6D9C10DB55
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007A7C07
                                                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007A7C1D
                                                              • GetWindowThreadProcessId.USER32(?,?), ref: 007A7C2C
                                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007A7C3B
                                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007A7C45
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007A7C4C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                              • String ID:
                                                              • API String ID: 839392675-0
                                                              • Opcode ID: 7b33348291ab1bcc3599f6289a154352d14ca986c21dd9314553caf67a8f22c3
                                                              • Instruction ID: b8ba555fa27dc75fe92e47f4bf6ff6271276c9a5fc6e6f7de37475dece574ed3
                                                              • Opcode Fuzzy Hash: 7b33348291ab1bcc3599f6289a154352d14ca986c21dd9314553caf67a8f22c3
                                                              • Instruction Fuzzy Hash: A1F03A72242198BBE7315B529C4EEEF7B7CEFCAB55F004018FA0199051E7A85E41C6B9
                                                              APIs
                                                              • InterlockedExchange.KERNEL32(?,?), ref: 007A9A33
                                                              • EnterCriticalSection.KERNEL32(?,?,?,?,007D5DEE,?,?,?,?,?,0076ED63), ref: 007A9A44
                                                              • TerminateThread.KERNEL32(?,000001F6,?,?,?,007D5DEE,?,?,?,?,?,0076ED63), ref: 007A9A51
                                                              • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,007D5DEE,?,?,?,?,?,0076ED63), ref: 007A9A5E
                                                                • Part of subcall function 007A93D1: CloseHandle.KERNEL32(?,?,007A9A6B,?,?,?,007D5DEE,?,?,?,?,?,0076ED63), ref: 007A93DB
                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 007A9A71
                                                              • LeaveCriticalSection.KERNEL32(?,?,?,?,007D5DEE,?,?,?,?,?,0076ED63), ref: 007A9A78
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                              • String ID:
                                                              • API String ID: 3495660284-0
                                                              • Opcode ID: 2e981f3d57d656995bf7fd8a302870cd619e547d57e7a748441e4a803110df4c
                                                              • Instruction ID: 086a945ea307c452fb23022876b2c7743c1733652c77c17c72a219f921e529fb
                                                              • Opcode Fuzzy Hash: 2e981f3d57d656995bf7fd8a302870cd619e547d57e7a748441e4a803110df4c
                                                              • Instruction Fuzzy Hash: 48F05E32142251EBD7211BA4ECCDDAA773DFF89301B148526F703990A0DB7D9C11DB55
                                                              APIs
                                                                • Part of subcall function 0077F4EA: std::exception::exception.LIBCMT ref: 0077F51E
                                                                • Part of subcall function 0077F4EA: __CxxThrowException@8.LIBCMT ref: 0077F533
                                                              • __swprintf.LIBCMT ref: 00761EA6
                                                              Strings
                                                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00761D49
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throw__swprintfstd::exception::exception
                                                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                              • API String ID: 2125237772-557222456
                                                              • Opcode ID: 24901bcf2095ca40497a32bf4f9ce9bd9456f94dfcf44b690e91fc26d47213fc
                                                              • Instruction ID: 4ace72b06b9f4eae896e2a5fe1bdc1316ef917b97471441c16679f6e3b6d24c5
                                                              • Opcode Fuzzy Hash: 24901bcf2095ca40497a32bf4f9ce9bd9456f94dfcf44b690e91fc26d47213fc
                                                              • Instruction Fuzzy Hash: 7F919B71104202DFCB25EF24C899C6AB7B8FF85700F44491EF886972A1DB39ED05CB92
                                                              APIs
                                                              • VariantInit.OLEAUT32(?), ref: 007BB006
                                                              • CharUpperBuffW.USER32(?,?), ref: 007BB115
                                                              • VariantClear.OLEAUT32(?), ref: 007BB298
                                                                • Part of subcall function 007A9DC5: VariantInit.OLEAUT32(00000000), ref: 007A9E05
                                                                • Part of subcall function 007A9DC5: VariantCopy.OLEAUT32(?,?), ref: 007A9E0E
                                                                • Part of subcall function 007A9DC5: VariantClear.OLEAUT32(?), ref: 007A9E1A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                              • API String ID: 4237274167-1221869570
                                                              • Opcode ID: 252099cdde61ac05be6d36a02ace24e7bd36f50f9bd9492a957d9dc489e16c91
                                                              • Instruction ID: e1af7562f1095f2a4792e5761a54e57a71f2dbb3ee3dd65d75bb93b77e5ed5b6
                                                              • Opcode Fuzzy Hash: 252099cdde61ac05be6d36a02ace24e7bd36f50f9bd9492a957d9dc489e16c91
                                                              • Instruction Fuzzy Hash: AB914970608305DFCB10DF24C485AAABBE4BF89704F04886DF89A9B361DB79E945CB52
                                                              APIs
                                                                • Part of subcall function 0077C6F4: _wcscpy.LIBCMT ref: 0077C717
                                                              • _memset.LIBCMT ref: 007A5438
                                                              • GetMenuItemInfoW.USER32(?), ref: 007A5467
                                                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007A5513
                                                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 007A553D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                              • String ID: 0
                                                              • API String ID: 4152858687-4108050209
                                                              • Opcode ID: e4adb65ed7996e6e77c40fb67a9fea973f17d0b19b7e834305ad7e66c9bd949d
                                                              • Instruction ID: 488067b38fa2f15d673d54bcc79a17be68b58ee54c8cf7a29e09bb0510c6d1af
                                                              • Opcode Fuzzy Hash: e4adb65ed7996e6e77c40fb67a9fea973f17d0b19b7e834305ad7e66c9bd949d
                                                              • Instruction Fuzzy Hash: BD514572A047419BDB109F28C8846ABB7EAEFCB324F14072DF896D3191D778CD448B52
                                                              APIs
                                                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007A027B
                                                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 007A02B1
                                                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 007A02C2
                                                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007A0344
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$AddressCreateInstanceProc
                                                              • String ID: DllGetClassObject
                                                              • API String ID: 753597075-1075368562
                                                              • Opcode ID: 6e75e84c02ec55a84283140712b4a89871b0429f9983f076ecb95d54a81e03a2
                                                              • Instruction ID: 461a1543d1e614118f14f533f62c1d53113a5610f7888ed2ac4bcb7a5f210f6f
                                                              • Opcode Fuzzy Hash: 6e75e84c02ec55a84283140712b4a89871b0429f9983f076ecb95d54a81e03a2
                                                              • Instruction Fuzzy Hash: C9416CB1600204EFDF15CF54C884B9A7BB9EF8A311F1485ADA9099F206D7B9ED44CBE0
                                                              APIs
                                                              • _memset.LIBCMT ref: 007A5075
                                                              • GetMenuItemInfoW.USER32 ref: 007A5091
                                                              • DeleteMenu.USER32(00000004,00000007,00000000), ref: 007A50D7
                                                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00821708,00000000), ref: 007A5120
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Menu$Delete$InfoItem_memset
                                                              • String ID: 0
                                                              • API String ID: 1173514356-4108050209
                                                              • Opcode ID: aa73ec22626f0c714b9fb3445e15bf4cbedc1404268c84b9bb22debdd30f54c8
                                                              • Instruction ID: 9a0d4c736ffaa339f41b2bb131e11c85a8046673aa02781361db3eecb70aa319
                                                              • Opcode Fuzzy Hash: aa73ec22626f0c714b9fb3445e15bf4cbedc1404268c84b9bb22debdd30f54c8
                                                              • Instruction Fuzzy Hash: 2F41D071205701EFD720DF24D884B2AB7E4AFCA324F144B1EF85597292D738E900CB66
                                                              APIs
                                                              • CharLowerBuffW.USER32(?,?,?,?), ref: 007C0587
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: BuffCharLower
                                                              • String ID: cdecl$none$stdcall$winapi
                                                              • API String ID: 2358735015-567219261
                                                              • Opcode ID: bedb9925cecfc6c17a0c2dc077e54d62291e8b4c5a71b9f871ac47f3e785aa2f
                                                              • Instruction ID: 79d14f18d291c8ceedbd0a2f26ef64d0d7ffd62be64261070d310efa531e5c8a
                                                              • Opcode Fuzzy Hash: bedb9925cecfc6c17a0c2dc077e54d62291e8b4c5a71b9f871ac47f3e785aa2f
                                                              • Instruction Fuzzy Hash: 3B31A170500216EFCF10EF64C845EEEB3B8FF55310B00866DE86AA76D1DB79A955CB90
                                                              APIs
                                                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 0079B88E
                                                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 0079B8A1
                                                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 0079B8D1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 3850602802-1403004172
                                                              • Opcode ID: 24426a806fac169e20b2408571c141b8e792065b897e40855669c0ef21b63f8b
                                                              • Instruction ID: 6d6eabf16db7d98b8c887644ff8da91817255abc67d5d010d9a359ea8d58260a
                                                              • Opcode Fuzzy Hash: 24426a806fac169e20b2408571c141b8e792065b897e40855669c0ef21b63f8b
                                                              • Instruction Fuzzy Hash: 1221E1B2900108EFDF14ABA4E98ADFE777CDF09350B108129F466A71E0DB7C5D0697A0
                                                              APIs
                                                              • _memset.LIBCMT ref: 0076522F
                                                              • _wcscpy.LIBCMT ref: 00765283
                                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00765293
                                                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 007D3CB0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                                              • String ID: Line:
                                                              • API String ID: 1053898822-1585850449
                                                              • Opcode ID: 985c6cdb9163a1ec84b9459021104d285b2e958413f3e41e182c1ac3648266d5
                                                              • Instruction ID: 569d855958d4119b9814798a99144d6dd0e5c55fc72c3abc7f54dd911760812f
                                                              • Opcode Fuzzy Hash: 985c6cdb9163a1ec84b9459021104d285b2e958413f3e41e182c1ac3648266d5
                                                              • Instruction Fuzzy Hash: 22310FB1108744EFC730EB60EC4AFDE77D8BF54300F10851AF98A92191EB78A648CB96
                                                              APIs
                                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007B4401
                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007B4427
                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 007B4457
                                                              • InternetCloseHandle.WININET(00000000), ref: 007B449E
                                                                • Part of subcall function 007B5052: GetLastError.KERNEL32(?,?,007B43CC,00000000,00000000,00000001), ref: 007B5067
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                                              • String ID:
                                                              • API String ID: 1951874230-3916222277
                                                              • Opcode ID: 92ba820554ead9df8525eaf7b15130716c1430d8a4f4be3b8609e69547f1cbd4
                                                              • Instruction ID: 003aa5c329ceb962f026ce9ef1224ee18d33cb96803adb677a04ebf9fc2002e6
                                                              • Opcode Fuzzy Hash: 92ba820554ead9df8525eaf7b15130716c1430d8a4f4be3b8609e69547f1cbd4
                                                              • Instruction Fuzzy Hash: 79218EB2600248BEE721AF64CCC9FFBBBFCEB48748F10851AF10996141EA788D059771
                                                              APIs
                                                                • Part of subcall function 0077D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0077D1BA
                                                                • Part of subcall function 0077D17C: GetStockObject.GDI32(00000011), ref: 0077D1CE
                                                                • Part of subcall function 0077D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0077D1D8
                                                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 007C915C
                                                              • LoadLibraryW.KERNEL32(?), ref: 007C9163
                                                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 007C9178
                                                              • DestroyWindow.USER32(?), ref: 007C9180
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                              • String ID: SysAnimate32
                                                              • API String ID: 4146253029-1011021900
                                                              • Opcode ID: 7f07bea154ad95a7f71d542fa64afd48c4ada1689210e39835ee4bee0cd99331
                                                              • Instruction ID: 2f841bfcdbf087a29f943ec9d09993509fc2adeb3e118c941d2af3626f21afef
                                                              • Opcode Fuzzy Hash: 7f07bea154ad95a7f71d542fa64afd48c4ada1689210e39835ee4bee0cd99331
                                                              • Instruction Fuzzy Hash: B721BE7120020AFBEF604E648C8EFBA77ADEF99364F19421CFA1496190D739CC51A765
                                                              APIs
                                                              • GetStdHandle.KERNEL32(0000000C), ref: 007A9588
                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007A95B9
                                                              • GetStdHandle.KERNEL32(0000000C), ref: 007A95CB
                                                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 007A9605
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CreateHandle$FilePipe
                                                              • String ID: nul
                                                              • API String ID: 4209266947-2873401336
                                                              • Opcode ID: 3794868bc3f3ecbb430ad2aec5566ac3a4bf884a45b56973bd78817f122de3ad
                                                              • Instruction ID: f99eda928239388186002e8f07f140e07a48ffed0c523d423eca1969daf021a7
                                                              • Opcode Fuzzy Hash: 3794868bc3f3ecbb430ad2aec5566ac3a4bf884a45b56973bd78817f122de3ad
                                                              • Instruction Fuzzy Hash: E9215170900205AFDB219F25DC46A9A77F8BF8A720F204B19FAA1DB2D0D778DD60CB10
                                                              APIs
                                                              • GetStdHandle.KERNEL32(000000F6), ref: 007A9653
                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007A9683
                                                              • GetStdHandle.KERNEL32(000000F6), ref: 007A9694
                                                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 007A96CE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CreateHandle$FilePipe
                                                              • String ID: nul
                                                              • API String ID: 4209266947-2873401336
                                                              • Opcode ID: f95fed6ca419361159bda1bf1c9a43d48715e4e3e89b9633e792a0d9af16f3c8
                                                              • Instruction ID: 6988cff176307b925e2e3f9a8eb2f9b9491055605d15fa801f1abca765fdfc03
                                                              • Opcode Fuzzy Hash: f95fed6ca419361159bda1bf1c9a43d48715e4e3e89b9633e792a0d9af16f3c8
                                                              • Instruction Fuzzy Hash: 622190715002059BDB249F699C44E9A77F8AF86720F204B18FBA1D72D0D7789861CB15
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 007ADB0A
                                                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 007ADB5E
                                                              • __swprintf.LIBCMT ref: 007ADB77
                                                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,007FDC00), ref: 007ADBB5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$InformationVolume__swprintf
                                                              • String ID: %lu
                                                              • API String ID: 3164766367-685833217
                                                              • Opcode ID: b00eb99a493227841411a38bb6c8f721e2110632e644bd5811295d96e64f987b
                                                              • Instruction ID: 0eac1cfe4d2607c5871d8518344e967ca91e411969115302daa6f58ebcf3e9be
                                                              • Opcode Fuzzy Hash: b00eb99a493227841411a38bb6c8f721e2110632e644bd5811295d96e64f987b
                                                              • Instruction Fuzzy Hash: 5A218675600148EFCB10EF55C985DAEB7B9EF89704B014069F909EB251DB74EE41CB61
                                                              APIs
                                                                • Part of subcall function 0079C82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0079C84A
                                                                • Part of subcall function 0079C82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 0079C85D
                                                                • Part of subcall function 0079C82D: GetCurrentThreadId.KERNEL32 ref: 0079C864
                                                                • Part of subcall function 0079C82D: AttachThreadInput.USER32(00000000), ref: 0079C86B
                                                              • GetFocus.USER32 ref: 0079CA05
                                                                • Part of subcall function 0079C876: GetParent.USER32(?), ref: 0079C884
                                                              • GetClassNameW.USER32(?,?,00000100), ref: 0079CA4E
                                                              • EnumChildWindows.USER32(?,0079CAC4), ref: 0079CA76
                                                              • __swprintf.LIBCMT ref: 0079CA90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                                              • String ID: %s%d
                                                              • API String ID: 3187004680-1110647743
                                                              • Opcode ID: c3ae58cb39742fbda839c2fbaae9995cdee4ac660049dd55f683ed98245b3368
                                                              • Instruction ID: 442d90062b05f50744f19120377e47770c8fb6f6de6dc27339da02846afef137
                                                              • Opcode Fuzzy Hash: c3ae58cb39742fbda839c2fbaae9995cdee4ac660049dd55f683ed98245b3368
                                                              • Instruction Fuzzy Hash: 4E1142B1500209ABDF12BFA09CC9FA9376DEF44754F008066FE19AA182DB789945DB70
                                                              APIs
                                                              • __lock.LIBCMT ref: 00787AD8
                                                                • Part of subcall function 00787CF4: __mtinitlocknum.LIBCMT ref: 00787D06
                                                                • Part of subcall function 00787CF4: EnterCriticalSection.KERNEL32(00000000,?,00787ADD,0000000D), ref: 00787D1F
                                                              • InterlockedIncrement.KERNEL32(?), ref: 00787AE5
                                                              • __lock.LIBCMT ref: 00787AF9
                                                              • ___addlocaleref.LIBCMT ref: 00787B17
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                              • String ID: `~
                                                              • API String ID: 1687444384-4191741149
                                                              • Opcode ID: 9625df7edf43632afbcfdb7850612bd33557056ad63636b345a653e2c58336de
                                                              • Instruction ID: d46fb1168ff85ad07a85a29eecf68a8b0a33ac9e21f4f228e02b4f768bffe234
                                                              • Opcode Fuzzy Hash: 9625df7edf43632afbcfdb7850612bd33557056ad63636b345a653e2c58336de
                                                              • Instruction Fuzzy Hash: 5F01C4B1445B00EFD720EF75C909749BBF4FF00320F20880EE496976A0CBB8A680CB11
                                                              APIs
                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 007C19F3
                                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 007C1A26
                                                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 007C1B49
                                                              • CloseHandle.KERNEL32(?), ref: 007C1BBF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                              • String ID:
                                                              • API String ID: 2364364464-0
                                                              • Opcode ID: 07db8c9bd194401f482d9f1bf9a7adc7495cf2f27b0e1dd8aae234ab639ea770
                                                              • Instruction ID: d7efe62847fbeaa627c0c5dd98062af1b8a063dc67c2d84b7ed009c6d0a2e39b
                                                              • Opcode Fuzzy Hash: 07db8c9bd194401f482d9f1bf9a7adc7495cf2f27b0e1dd8aae234ab639ea770
                                                              • Instruction Fuzzy Hash: C28171B0600204EBDF119F64C89ABADBBE5EF09710F14C459F919AF392D7B8AD418B90
                                                              APIs
                                                              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 007CE1D5
                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 007CE20D
                                                              • IsDlgButtonChecked.USER32(?,00000001), ref: 007CE248
                                                              • GetWindowLongW.USER32(?,000000EC), ref: 007CE269
                                                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 007CE281
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$ButtonCheckedLongWindow
                                                              • String ID:
                                                              • API String ID: 3188977179-0
                                                              • Opcode ID: 9802c179feb65f50581795ad626f962066e2e52086b284eff4635c5802652d0f
                                                              • Instruction ID: 1f697f3d85ae035592018e6188bf3315d189238ff03526dcd623c26a2f96ee5b
                                                              • Opcode Fuzzy Hash: 9802c179feb65f50581795ad626f962066e2e52086b284eff4635c5802652d0f
                                                              • Instruction Fuzzy Hash: AE61B174A00248AFDB21CF58C895FAE77BAFB59300F18805DF99997391C778AD90CB50
                                                              APIs
                                                              • VariantInit.OLEAUT32(?), ref: 007A1CB4
                                                              • VariantClear.OLEAUT32(00000013), ref: 007A1D26
                                                              • VariantClear.OLEAUT32(00000000), ref: 007A1D81
                                                              • VariantClear.OLEAUT32(?), ref: 007A1DF8
                                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 007A1E26
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Variant$Clear$ChangeInitType
                                                              • String ID:
                                                              • API String ID: 4136290138-0
                                                              • Opcode ID: 23c17bfd21d9718f496faae0fc89d99d612d3461f825ee3f41b69bd8ccdfbd2f
                                                              • Instruction ID: 4dee1b741fff09fa27ff0747591e87237e0ee5a0f6203a8f5378068107d45ea5
                                                              • Opcode Fuzzy Hash: 23c17bfd21d9718f496faae0fc89d99d612d3461f825ee3f41b69bd8ccdfbd2f
                                                              • Instruction Fuzzy Hash: BC5156B5A00249AFDB14CF58C884AAAB7B8FF8D314F158559ED59DB344E334EA11CBA0
                                                              APIs
                                                                • Part of subcall function 0076936C: __swprintf.LIBCMT ref: 007693AB
                                                                • Part of subcall function 0076936C: __itow.LIBCMT ref: 007693DF
                                                              • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 007C06EE
                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 007C077D
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 007C079B
                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 007C07E1
                                                              • FreeLibrary.KERNEL32(00000000,00000004), ref: 007C07FB
                                                                • Part of subcall function 0077E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,007AA574,?,?,00000000,00000008), ref: 0077E675
                                                                • Part of subcall function 0077E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,007AA574,?,?,00000000,00000008), ref: 0077E699
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                              • String ID:
                                                              • API String ID: 327935632-0
                                                              • Opcode ID: 72458d2011af24836a9b7d888a09eb2def384ee09d90244feb542f8a78468c42
                                                              • Instruction ID: fcbb0a89a92f85c7c98ef609fe6c5b9b9e2bf32259b4e67cb5ece729c152721a
                                                              • Opcode Fuzzy Hash: 72458d2011af24836a9b7d888a09eb2def384ee09d90244feb542f8a78468c42
                                                              • Instruction Fuzzy Hash: CB514875A00209DFCF14EFA8C495EADB7B5BF48310B05C059EA1AAB352DB38ED45CB80
                                                              APIs
                                                                • Part of subcall function 007C3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C2BB5,?,?), ref: 007C3C1D
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C2EEF
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007C2F2E
                                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 007C2F75
                                                              • RegCloseKey.ADVAPI32(?,?), ref: 007C2FA1
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 007C2FAE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                              • String ID:
                                                              • API String ID: 3740051246-0
                                                              • Opcode ID: cf03c8f5a5312dc3608bc9b7ed9b715d34a30cdfcf528f08df3fe4dd1864af98
                                                              • Instruction ID: ed81d0c700b61bdeae9105b3dcd6ae5a692dfa5e73f8071993a976313053651c
                                                              • Opcode Fuzzy Hash: cf03c8f5a5312dc3608bc9b7ed9b715d34a30cdfcf528f08df3fe4dd1864af98
                                                              • Instruction Fuzzy Hash: 6E515871608204EFC715EB64C885F6AB7F9BF88304F04891DF9969B292DB78E905CB52
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5b4a03968884529b2181eaf5756360ea4999019eeeeb373a68d809a18fb2869e
                                                              • Instruction ID: 845cf11f3d556d7c205a12b6b3f5709e6f809bbacb5747109aa5aff3193a760c
                                                              • Opcode Fuzzy Hash: 5b4a03968884529b2181eaf5756360ea4999019eeeeb373a68d809a18fb2869e
                                                              • Instruction Fuzzy Hash: 6541C739A01244AFCB22DF68CC48FA97B68FB0A350F19416DF95EA72D1C738AD51D790
                                                              APIs
                                                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 007B12B4
                                                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 007B12DD
                                                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 007B131C
                                                                • Part of subcall function 0076936C: __swprintf.LIBCMT ref: 007693AB
                                                                • Part of subcall function 0076936C: __itow.LIBCMT ref: 007693DF
                                                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 007B1341
                                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 007B1349
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                              • String ID:
                                                              • API String ID: 1389676194-0
                                                              • Opcode ID: f9af14aa0c00a887946e2a8a71fa09201ca842ee1b927ab4d4c536a4ebb4ef15
                                                              • Instruction ID: 9684799fe92b41e79fe6368af0c35b8f7d8b4efe21d4f3c09e84fa90eeff9d4c
                                                              • Opcode Fuzzy Hash: f9af14aa0c00a887946e2a8a71fa09201ca842ee1b927ab4d4c536a4ebb4ef15
                                                              • Instruction Fuzzy Hash: E2410A35A00105DFDF01EF64C995AAEBBF9FF48310B148099E90AAB362DB39ED01DB54
                                                              APIs
                                                              • GetCursorPos.USER32(000000FF), ref: 0077B64F
                                                              • ScreenToClient.USER32(00000000,000000FF), ref: 0077B66C
                                                              • GetAsyncKeyState.USER32(00000001), ref: 0077B691
                                                              • GetAsyncKeyState.USER32(00000002), ref: 0077B69F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AsyncState$ClientCursorScreen
                                                              • String ID:
                                                              • API String ID: 4210589936-0
                                                              • Opcode ID: ffe1f88667d4f710cf7456025d9eca79e88142710729a0464ae1688181c47bb7
                                                              • Instruction ID: a83e70c989830059f3f1161ded62ab33e583cf3ce456d639fbd145296c1387b8
                                                              • Opcode Fuzzy Hash: ffe1f88667d4f710cf7456025d9eca79e88142710729a0464ae1688181c47bb7
                                                              • Instruction Fuzzy Hash: 69416E35504115FFCF259F64C848BE9BB74FB09364F20831AE829D6290CB38AD94DFA1
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0079B369
                                                              • PostMessageW.USER32(?,00000201,00000001), ref: 0079B413
                                                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 0079B41B
                                                              • PostMessageW.USER32(?,00000202,00000000), ref: 0079B429
                                                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 0079B431
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessagePostSleep$RectWindow
                                                              • String ID:
                                                              • API String ID: 3382505437-0
                                                              • Opcode ID: 73df1d6821db860410670d00aed1de37d5c89883dc345c0e6b6c1843e59ad39f
                                                              • Instruction ID: 1a1ee63c341e4324d912b859dcda0c98f1b5bd78b5af5e6768c4321acce464ad
                                                              • Opcode Fuzzy Hash: 73df1d6821db860410670d00aed1de37d5c89883dc345c0e6b6c1843e59ad39f
                                                              • Instruction Fuzzy Hash: 1E31DF7190025DEBDF14CFA8EE8DA9E3BB5EB04315F108229F821AB1D1C3B89D14DB90
                                                              APIs
                                                              • IsWindowVisible.USER32(?), ref: 0079DBD7
                                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0079DBF4
                                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0079DC2C
                                                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0079DC52
                                                              • _wcsstr.LIBCMT ref: 0079DC5C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                              • String ID:
                                                              • API String ID: 3902887630-0
                                                              • Opcode ID: d5f20462818e1ceced82335f5c30ad3ee24add061c3ffc908124c7b5d4560b69
                                                              • Instruction ID: 3d2b7d168ff434fee14d5658e3145ac6e844d1451dff7f73040ae40100faf93c
                                                              • Opcode Fuzzy Hash: d5f20462818e1ceced82335f5c30ad3ee24add061c3ffc908124c7b5d4560b69
                                                              • Instruction Fuzzy Hash: C221F572204140BFEF259F39ED49E7B7BA8DF4A750F108029F809CA191EAA9DC0192A0
                                                              APIs
                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0079BC90
                                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0079BCC2
                                                              • __itow.LIBCMT ref: 0079BCDA
                                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0079BD00
                                                              • __itow.LIBCMT ref: 0079BD11
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$__itow
                                                              • String ID:
                                                              • API String ID: 3379773720-0
                                                              • Opcode ID: 10a4b8777a75c6957bf65f90d10e016d3912e1dcdb77142b9649131734879ebf
                                                              • Instruction ID: 2fbe8331d98dfaa12d380e81d410e4a2e8e5c1af3f3c404ef8212e755cafb5f6
                                                              • Opcode Fuzzy Hash: 10a4b8777a75c6957bf65f90d10e016d3912e1dcdb77142b9649131734879ebf
                                                              • Instruction Fuzzy Hash: AB21DB35700218BBDF20AE65BD8AFDE7A69EF4A750F004064F906EB181DB788D4587F1
                                                              APIs
                                                                • Part of subcall function 007650E6: _wcsncpy.LIBCMT ref: 007650FA
                                                              • GetFileAttributesW.KERNEL32(?,?,?,?,007A60C3), ref: 007A6369
                                                              • GetLastError.KERNEL32(?,?,?,007A60C3), ref: 007A6374
                                                              • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,007A60C3), ref: 007A6388
                                                              • _wcsrchr.LIBCMT ref: 007A63AA
                                                                • Part of subcall function 007A6318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,007A60C3), ref: 007A63E0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                                              • String ID:
                                                              • API String ID: 3633006590-0
                                                              • Opcode ID: 8f6448aae1ec33cf9eed547293e0973c8bac6765e1ccf1fcdfdeae62eecc91bf
                                                              • Instruction ID: 69d35b4bb68e832889d67365e3d559346745b9da9959eff9137880f559d131b6
                                                              • Opcode Fuzzy Hash: 8f6448aae1ec33cf9eed547293e0973c8bac6765e1ccf1fcdfdeae62eecc91bf
                                                              • Instruction Fuzzy Hash: 19212B31505215DBDF25AB749C56FEA33ACEF4B3A0F184565F105C70C0EB6CDD828A65
                                                              APIs
                                                                • Part of subcall function 007BA82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 007BA84E
                                                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 007B8BD3
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 007B8BE2
                                                              • connect.WSOCK32(00000000,?,00000010), ref: 007B8BFE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastconnectinet_addrsocket
                                                              • String ID:
                                                              • API String ID: 3701255441-0
                                                              • Opcode ID: 403f7229a03a20f752c421aeaf9912bec66d3490b5aa7f53844f3e5cd389dc42
                                                              • Instruction ID: df7395aa19c07cae333020aafbe7f2726791cf898dffb487b8e9284b21bd09c6
                                                              • Opcode Fuzzy Hash: 403f7229a03a20f752c421aeaf9912bec66d3490b5aa7f53844f3e5cd389dc42
                                                              • Instruction Fuzzy Hash: 1F2181712002149FDB21AF68C989FBE77ADEF48750F048559F916AB292CB78AC018761
                                                              APIs
                                                              • IsWindow.USER32(00000000), ref: 007B8441
                                                              • GetForegroundWindow.USER32 ref: 007B8458
                                                              • GetDC.USER32(00000000), ref: 007B8494
                                                              • GetPixel.GDI32(00000000,?,00000003), ref: 007B84A0
                                                              • ReleaseDC.USER32(00000000,00000003), ref: 007B84DB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$ForegroundPixelRelease
                                                              • String ID:
                                                              • API String ID: 4156661090-0
                                                              • Opcode ID: ba4f452eb5a5245bbe69d56b716ab427c4715d293c68a1794fefbe56161aee15
                                                              • Instruction ID: fe06b7a006c238f9c38435256df5548f1564d4cae7618e05d7d44e368eda8d6c
                                                              • Opcode Fuzzy Hash: ba4f452eb5a5245bbe69d56b716ab427c4715d293c68a1794fefbe56161aee15
                                                              • Instruction Fuzzy Hash: C8218475A00204EFDB10DFA4C989A9EB7E9EF48341F04C479E85A9B252DB78AD04CB60
                                                              APIs
                                                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0077AFE3
                                                              • SelectObject.GDI32(?,00000000), ref: 0077AFF2
                                                              • BeginPath.GDI32(?), ref: 0077B009
                                                              • SelectObject.GDI32(?,00000000), ref: 0077B033
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ObjectSelect$BeginCreatePath
                                                              • String ID:
                                                              • API String ID: 3225163088-0
                                                              • Opcode ID: 828bd0e3d4c60e0fc640cf8af7173f0824568e06726507a012a8f7053d602dbb
                                                              • Instruction ID: 7fddc31f7d74aa1181d3e3b028ee641410e3724dfea89c5844ee310ce7d160c3
                                                              • Opcode Fuzzy Hash: 828bd0e3d4c60e0fc640cf8af7173f0824568e06726507a012a8f7053d602dbb
                                                              • Instruction Fuzzy Hash: F6219070801349EFDF319F54EC88BAE7B69BB34395F24C21AE425961A0D3788846CB91
                                                              APIs
                                                              • __calloc_crt.LIBCMT ref: 007821A9
                                                              • CreateThread.KERNEL32(?,?,007822DF,00000000,?,?), ref: 007821ED
                                                              • GetLastError.KERNEL32 ref: 007821F7
                                                              • _free.LIBCMT ref: 00782200
                                                              • __dosmaperr.LIBCMT ref: 0078220B
                                                                • Part of subcall function 00787C0E: __getptd_noexit.LIBCMT ref: 00787C0E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                              • String ID:
                                                              • API String ID: 2664167353-0
                                                              • Opcode ID: eb37194f6c207e8a4b23359e25136c0005a41a8df05be5250c2caef030bfe58c
                                                              • Instruction ID: d9dea0959aba0ad9ccd0d13e69ff3e46038efceb5a907547686bb9a09850347c
                                                              • Opcode Fuzzy Hash: eb37194f6c207e8a4b23359e25136c0005a41a8df05be5250c2caef030bfe58c
                                                              • Instruction Fuzzy Hash: 0D112B33284346EFDB25BF65DC49D5B3B98FF04771B200029F92586192EB79D812C7A1
                                                              APIs
                                                              • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0079ABD7
                                                              • GetLastError.KERNEL32(?,0079A69F,?,?,?), ref: 0079ABE1
                                                              • GetProcessHeap.KERNEL32(00000008,?,?,0079A69F,?,?,?), ref: 0079ABF0
                                                              • HeapAlloc.KERNEL32(00000000,?,0079A69F,?,?,?), ref: 0079ABF7
                                                              • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0079AC0E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                              • String ID:
                                                              • API String ID: 842720411-0
                                                              • Opcode ID: ee3dbf24f71b30afa92da33a463b5661ced758a8fb7cba736fc4149d00dec162
                                                              • Instruction ID: 5773e70d083181c2f08d4cad0540b39d3af256f6006054089e9e9ead3f674839
                                                              • Opcode Fuzzy Hash: ee3dbf24f71b30afa92da33a463b5661ced758a8fb7cba736fc4149d00dec162
                                                              • Instruction Fuzzy Hash: 5A018170202244BFDF208FA9EC88D6B3BADEF8A3547104429F405CB250D675CC40CBB4
                                                              APIs
                                                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 007A7A74
                                                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 007A7A82
                                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007A7A8A
                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 007A7A94
                                                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 007A7AD0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                                              • String ID:
                                                              • API String ID: 2833360925-0
                                                              • Opcode ID: b57a132df61388234bbcf995892c0c78057e058dcb560b05ef7aba526518a395
                                                              • Instruction ID: a1defb9c83a1778cd2ea30b7b0f8f6ae230d2f9fde27b9f6f5edfa6b68802d9e
                                                              • Opcode Fuzzy Hash: b57a132df61388234bbcf995892c0c78057e058dcb560b05ef7aba526518a395
                                                              • Instruction Fuzzy Hash: 1E015731D0661DEBCF14AFE8DC88ADDBB78FB4D311F018545E502B2250DB389A50C7A5
                                                              APIs
                                                              • CLSIDFromProgID.OLE32 ref: 00799ADC
                                                              • ProgIDFromCLSID.OLE32(?,00000000), ref: 00799AF7
                                                              • lstrcmpiW.KERNEL32(?,00000000), ref: 00799B05
                                                              • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00799B15
                                                              • CLSIDFromString.OLE32(?,?), ref: 00799B21
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: From$Prog$FreeStringTasklstrcmpi
                                                              • String ID:
                                                              • API String ID: 3897988419-0
                                                              • Opcode ID: 69732e3638339aa6d26244d63fc27f0a87ebec562158c8d241c3455aec866c17
                                                              • Instruction ID: 9eff986d3fa64dd0ead9c64ecad760709a38448fa7c4ddb92cd4daa5339198d9
                                                              • Opcode Fuzzy Hash: 69732e3638339aa6d26244d63fc27f0a87ebec562158c8d241c3455aec866c17
                                                              • Instruction Fuzzy Hash: 70014FB6601215FFEB214F58ED84B9E7BEDEB48752F148028FA09D6210D77DDD409BA0
                                                              APIs
                                                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0079AA79
                                                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0079AA83
                                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0079AA92
                                                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0079AA99
                                                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0079AAAF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                                              • String ID:
                                                              • API String ID: 44706859-0
                                                              • Opcode ID: c477b902637eed2f4c13ac228911e9b8bb198cfc7991304366ade475a4c670ae
                                                              • Instruction ID: 236cde5022039a24680fe79b9e40b11ebf42730feb4304d0bc2ebf31b2c78200
                                                              • Opcode Fuzzy Hash: c477b902637eed2f4c13ac228911e9b8bb198cfc7991304366ade475a4c670ae
                                                              • Instruction Fuzzy Hash: 95F04F71202344BFEB215FA5AC89E773BACFF4D754F048419F941CB190DA789C41CAA1
                                                              APIs
                                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0079AADA
                                                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0079AAE4
                                                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0079AAF3
                                                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0079AAFA
                                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0079AB10
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                                              • String ID:
                                                              • API String ID: 44706859-0
                                                              • Opcode ID: 10bdc0daa409b9314c217e3ceaded2b9b9bee7e0355791dd444be6536bb12574
                                                              • Instruction ID: 806e79f5efdc0f9895f6ffed8d9d76cadcb01c011e6bf1ebf62136c6c38d2411
                                                              • Opcode Fuzzy Hash: 10bdc0daa409b9314c217e3ceaded2b9b9bee7e0355791dd444be6536bb12574
                                                              • Instruction Fuzzy Hash: D7F04F71202248BFEB215FA4ECC8E773B6EFF49754F004029F941CB190CA789D018AA1
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003E9), ref: 0079EC94
                                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 0079ECAB
                                                              • MessageBeep.USER32(00000000), ref: 0079ECC3
                                                              • KillTimer.USER32(?,0000040A), ref: 0079ECDF
                                                              • EndDialog.USER32(?,00000001), ref: 0079ECF9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                              • String ID:
                                                              • API String ID: 3741023627-0
                                                              • Opcode ID: 1eb8586688adb26271c38f367d79adb2bf5caf224caa9f5aa318415b81b6d458
                                                              • Instruction ID: 170ae27b1c25cf4eab73aa54a9d76a0e30702a029661ee226c8190b614dc0dc8
                                                              • Opcode Fuzzy Hash: 1eb8586688adb26271c38f367d79adb2bf5caf224caa9f5aa318415b81b6d458
                                                              • Instruction Fuzzy Hash: 12018130500744ABEF349B50EE9EB9677B8FB05705F008959B583A54E0DBF8AE94CB54
                                                              APIs
                                                              • EndPath.GDI32(?), ref: 0077B0BA
                                                              • StrokeAndFillPath.GDI32(?,?,007DE680,00000000,?,?,?), ref: 0077B0D6
                                                              • SelectObject.GDI32(?,00000000), ref: 0077B0E9
                                                              • DeleteObject.GDI32 ref: 0077B0FC
                                                              • StrokePath.GDI32(?), ref: 0077B117
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Path$ObjectStroke$DeleteFillSelect
                                                              • String ID:
                                                              • API String ID: 2625713937-0
                                                              • Opcode ID: 04fbeecac76542d549464f22f14b7a5216f10297f4274414fd64ca0fc2f36ef1
                                                              • Instruction ID: 5b3892be673fcebb25c4f18cd1068c2dce7f1ce272010d287831824d4a86c40d
                                                              • Opcode Fuzzy Hash: 04fbeecac76542d549464f22f14b7a5216f10297f4274414fd64ca0fc2f36ef1
                                                              • Instruction Fuzzy Hash: 09F0B63000524CAFDF319F65EC4DB593B65B7643A6FA8C315E429490F0C7398966DF54
                                                              APIs
                                                              • CoInitialize.OLE32(00000000), ref: 007AF2DA
                                                              • CoCreateInstance.OLE32(007EDA7C,00000000,00000001,007ED8EC,?), ref: 007AF2F2
                                                              • CoUninitialize.OLE32 ref: 007AF555
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CreateInitializeInstanceUninitialize
                                                              • String ID: .lnk
                                                              • API String ID: 948891078-24824748
                                                              • Opcode ID: ef942700517f2c7855213c1323996859ceac5ecc4d1ad3af2d3c20bc041cddcf
                                                              • Instruction ID: cb9f9f248ba6899c501bd97c7a7410d6de1826e066ff143ab7e7e8c70bf70f11
                                                              • Opcode Fuzzy Hash: ef942700517f2c7855213c1323996859ceac5ecc4d1ad3af2d3c20bc041cddcf
                                                              • Instruction Fuzzy Hash: 78A14DB1104201EFD701EF54C885DABB7ECEF98714F00491DF59A97192DB75EA09CBA2
                                                              APIs
                                                                • Part of subcall function 0076660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007653B1,?,?,007661FF,?,00000000,00000001,00000000), ref: 0076662F
                                                              • CoInitialize.OLE32(00000000), ref: 007AE85D
                                                              • CoCreateInstance.OLE32(007EDA7C,00000000,00000001,007ED8EC,?), ref: 007AE876
                                                              • CoUninitialize.OLE32 ref: 007AE893
                                                                • Part of subcall function 0076936C: __swprintf.LIBCMT ref: 007693AB
                                                                • Part of subcall function 0076936C: __itow.LIBCMT ref: 007693DF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                              • String ID: .lnk
                                                              • API String ID: 2126378814-24824748
                                                              • Opcode ID: fb1648584316ca04d89b1da66270e51125aed95b953cee670256c3f82ce0adf2
                                                              • Instruction ID: 3583bb30497de921648594425868ace0bfde4df45733479b92e0bf96b97f80c4
                                                              • Opcode Fuzzy Hash: fb1648584316ca04d89b1da66270e51125aed95b953cee670256c3f82ce0adf2
                                                              • Instruction Fuzzy Hash: F3A14775604301DFCB14DF14C88896ABBE5FF89310F058A58F99A9B3A1CB39EC45CB92
                                                              APIs
                                                              • __startOneArgErrorHandling.LIBCMT ref: 007832ED
                                                                • Part of subcall function 0078E0D0: __87except.LIBCMT ref: 0078E10B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorHandling__87except__start
                                                              • String ID: pow
                                                              • API String ID: 2905807303-2276729525
                                                              • Opcode ID: a695b7eda5edc6a77b83a4c3f009e98c1f1663780d4bb173f9549d03245b4cb2
                                                              • Instruction ID: 5dd6161d02fddadc97424db911f50141d51e673bbc1dfd9fe2972c8211197d57
                                                              • Opcode Fuzzy Hash: a695b7eda5edc6a77b83a4c3f009e98c1f1663780d4bb173f9549d03245b4cb2
                                                              • Instruction Fuzzy Hash: 9F513831E89605D6CB15B71CC94937A2B98BB40B20F308D68F4D5825EAEF7C8EC5DB46
                                                              APIs
                                                              • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,007FDC50,?,0000000F,0000000C,00000016,007FDC50,?), ref: 007A4645
                                                                • Part of subcall function 0076936C: __swprintf.LIBCMT ref: 007693AB
                                                                • Part of subcall function 0076936C: __itow.LIBCMT ref: 007693DF
                                                              • CharUpperBuffW.USER32(?,?,00000000,?), ref: 007A46C5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: BuffCharUpper$__itow__swprintf
                                                              • String ID: REMOVE$THIS
                                                              • API String ID: 3797816924-776492005
                                                              • Opcode ID: d338f6cad7deac7119fe11e379d7251e6e76426fcaf390b848b19749a2a5d7de
                                                              • Instruction ID: 6bd6eb19a315599da2de0e017decdc12aef4d24ca497b75ec3c19c23fe399331
                                                              • Opcode Fuzzy Hash: d338f6cad7deac7119fe11e379d7251e6e76426fcaf390b848b19749a2a5d7de
                                                              • Instruction Fuzzy Hash: 92418134A00249DFCF01DFA4C885AADB7B9FFCA304F148159E916AB292DB79DD45CB50
                                                              APIs
                                                                • Part of subcall function 007A430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0079BC08,?,?,00000034,00000800,?,00000034), ref: 007A4335
                                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0079C1D3
                                                                • Part of subcall function 007A42D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0079BC37,?,?,00000800,?,00001073,00000000,?,?), ref: 007A4300
                                                                • Part of subcall function 007A422F: GetWindowThreadProcessId.USER32(?,?), ref: 007A425A
                                                                • Part of subcall function 007A422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0079BBCC,00000034,?,?,00001004,00000000,00000000), ref: 007A426A
                                                                • Part of subcall function 007A422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0079BBCC,00000034,?,?,00001004,00000000,00000000), ref: 007A4280
                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0079C240
                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0079C28D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                              • String ID: @
                                                              • API String ID: 4150878124-2766056989
                                                              • Opcode ID: 23ff9106da0d4e0cf924ab9101276857724485c2969df39214b27ece2940b74e
                                                              • Instruction ID: 532b2e0ad4c0474fcdbcfb723fa000983bf778ac2f6709885a4b8f817e749061
                                                              • Opcode Fuzzy Hash: 23ff9106da0d4e0cf924ab9101276857724485c2969df39214b27ece2940b74e
                                                              • Instruction Fuzzy Hash: 3B414A72900218AFDF11DFA4CD85AEEB7B8FF8A300F004195FA45B7181DA756E45CB61
                                                              APIs
                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,007FDC00,00000000,?,?,?,?), ref: 007CA6D8
                                                              • GetWindowLongW.USER32 ref: 007CA6F5
                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 007CA705
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$Long
                                                              • String ID: SysTreeView32
                                                              • API String ID: 847901565-1698111956
                                                              • Opcode ID: d33fb3c879fc1d32b50e8b483063ae189298ed4a5364966a3005eabde9c20d15
                                                              • Instruction ID: 261c3381c59c5f64679db8fe062b9b0916f60d6561d74225d59249ba915c3f39
                                                              • Opcode Fuzzy Hash: d33fb3c879fc1d32b50e8b483063ae189298ed4a5364966a3005eabde9c20d15
                                                              • Instruction Fuzzy Hash: 58319D31601209AFDF218E34CC45FEA77A9FB49368F244729F975A32E0C738AC509B50
                                                              APIs
                                                              • _memset.LIBCMT ref: 007B5190
                                                              • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 007B51C6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CrackInternet_memset
                                                              • String ID: |$D{
                                                              • API String ID: 1413715105-1531470645
                                                              • Opcode ID: 5b51a4a1cc56010c19f0c7805dd475da2b8ec052a08c017e72b73b56e916c13f
                                                              • Instruction ID: c58fb6b2f77cc98ad4cfbb552dc0828152346b7ce24818e3008508d3ee803829
                                                              • Opcode Fuzzy Hash: 5b51a4a1cc56010c19f0c7805dd475da2b8ec052a08c017e72b73b56e916c13f
                                                              • Instruction Fuzzy Hash: 5E311971C01119EFCF01AFA4CC89AEE7FB9FF18700F004015EC15AA166DA35A946CBA0
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 007CA15E
                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 007CA172
                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 007CA196
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window
                                                              • String ID: SysMonthCal32
                                                              • API String ID: 2326795674-1439706946
                                                              • Opcode ID: df28cb9fd8343aa0ee9097f2d15692ed11990f198b81e712a231d63052b5c17c
                                                              • Instruction ID: ed02e9ec15f110558bf91830cffecea13d16df7c268d198f03dd79d048638fb3
                                                              • Opcode Fuzzy Hash: df28cb9fd8343aa0ee9097f2d15692ed11990f198b81e712a231d63052b5c17c
                                                              • Instruction Fuzzy Hash: 0E217C3251021CBBDF258E94CC86FEA3B79EF48764F150218FA55AB1D0D6B9AC51CBA0
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 007CA941
                                                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 007CA94F
                                                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 007CA956
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$DestroyWindow
                                                              • String ID: msctls_updown32
                                                              • API String ID: 4014797782-2298589950
                                                              • Opcode ID: 650b561e62e3dbd0fcc7e7c28135282976aeac35ceaf01f29ae36222d046bdc3
                                                              • Instruction ID: c90af7227c852c93b741b0c7155d39bdd2de200f8981a047b912239cc3848c7a
                                                              • Opcode Fuzzy Hash: 650b561e62e3dbd0fcc7e7c28135282976aeac35ceaf01f29ae36222d046bdc3
                                                              • Instruction Fuzzy Hash: FF21A1B5600209BFDB10DF64CC86E6B37ADEF5A3A8B15015DFA049B351CB34EC128B61
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 007C9A30
                                                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 007C9A40
                                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 007C9A65
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$MoveWindow
                                                              • String ID: Listbox
                                                              • API String ID: 3315199576-2633736733
                                                              • Opcode ID: fe1cc1bdd56a2747b7e9a12bb74812148e5b9cd5a462553e5059347b04bdb2a7
                                                              • Instruction ID: 41fd927af3015ad19502f0ba1214ca8cad8e44a11db3719245dc6a9ee3f6f91c
                                                              • Opcode Fuzzy Hash: fe1cc1bdd56a2747b7e9a12bb74812148e5b9cd5a462553e5059347b04bdb2a7
                                                              • Instruction Fuzzy Hash: A6217132610118BFDF218F54CC89FAF3BAAEF89760F11812DFA549B190C675AC51C7A0
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 007CA46D
                                                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 007CA482
                                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 007CA48F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: msctls_trackbar32
                                                              • API String ID: 3850602802-1010561917
                                                              • Opcode ID: 79285cd8e177995b9ccd0f4a6876ec1542fdcdd541b72b689ef4a5d84043b77e
                                                              • Instruction ID: a0b6625cd6f4f2b477573d571dbced90e37cc087654e321b89fab7c2564fde8a
                                                              • Opcode Fuzzy Hash: 79285cd8e177995b9ccd0f4a6876ec1542fdcdd541b72b689ef4a5d84043b77e
                                                              • Instruction Fuzzy Hash: 9811E771200248BEEF245F64CC49FAB376DFF88768F11411CFA4596091D2B9E811C724
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00782350,?), ref: 007822A1
                                                              • GetProcAddress.KERNEL32(00000000), ref: 007822A8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: RoInitialize$combase.dll
                                                              • API String ID: 2574300362-340411864
                                                              • Opcode ID: 22abff263b3c4f6b7dfbca7c12392a032cf348603e9819138e5a1298093b75ab
                                                              • Instruction ID: c0726d2be993366c155d0f94aa45d9bdd94baba431939d0d22f76d29c7ef6b2e
                                                              • Opcode Fuzzy Hash: 22abff263b3c4f6b7dfbca7c12392a032cf348603e9819138e5a1298093b75ab
                                                              • Instruction Fuzzy Hash: 48E01A70A91340EBDB306F71ED89B543669BB08712F00C024B102D50A1CBB888A2CF08
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00782276), ref: 00782376
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0078237D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: RoUninitialize$combase.dll
                                                              • API String ID: 2574300362-2819208100
                                                              • Opcode ID: ade9d5a28cb6b8c5e138358a60fb2a4fba309b3edee7faa504ca5049048b1909
                                                              • Instruction ID: 57ee8dfa35b5984d59e22a2dc354c5983918cea9ba2427279158479b51547c99
                                                              • Opcode Fuzzy Hash: ade9d5a28cb6b8c5e138358a60fb2a4fba309b3edee7faa504ca5049048b1909
                                                              • Instruction Fuzzy Hash: D5E0ECB0586340EFDB306F61ED4EB443A69BB08702F11C424F109DA0B2CBBC5822CF14
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: LocalTime__swprintf
                                                              • String ID: %.3d$WIN_XPe
                                                              • API String ID: 2070861257-2409531811
                                                              • Opcode ID: 01618b57dc69b424e8b8984bec9572f5be04ddc02d94e9417433a9168d6d79f5
                                                              • Instruction ID: 78821af2aa226f9a1f26ddf224bae26efda0a65834b8cbe621add5a42f11df88
                                                              • Opcode Fuzzy Hash: 01618b57dc69b424e8b8984bec9572f5be04ddc02d94e9417433a9168d6d79f5
                                                              • Instruction Fuzzy Hash: 71E0EC71814618EBCA1097508D499FA737CFB08751F544093BA0AA2200E63D9BC4AA22
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,007C21FB,?,007C23EF), ref: 007C2213
                                                              • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 007C2225
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: GetProcessId$kernel32.dll
                                                              • API String ID: 2574300362-399901964
                                                              • Opcode ID: 925c991fa41e5ec8d916b2d452c1ef777dba7afe8ba4c6d6d74c9e069465515e
                                                              • Instruction ID: d59273e9375a807f32de8d9374bda3e24973b8945ba743e45bd0eae38d1765d4
                                                              • Opcode Fuzzy Hash: 925c991fa41e5ec8d916b2d452c1ef777dba7afe8ba4c6d6d74c9e069465515e
                                                              • Instruction Fuzzy Hash: 8DD05E344007169FC7214B24A848A8177EAFF08710B02842DA856E2251D678D8808650
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(kernel32.dll,00000000,007642EC,?,007642AA,?), ref: 00764304
                                                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00764316
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                              • API String ID: 2574300362-1355242751
                                                              • Opcode ID: 121a32130f56eeba88f210b7e476ca654f87741e755ce1bac191d84b1a03f8ea
                                                              • Instruction ID: 826f73acac08120d5080eab10736ba2c2dcc7b36bbb57d1ac6e15e20f31f90d3
                                                              • Opcode Fuzzy Hash: 121a32130f56eeba88f210b7e476ca654f87741e755ce1bac191d84b1a03f8ea
                                                              • Instruction Fuzzy Hash: 1CD05E304007129EC7214B25A8486417AE9EF08301B018419A856E6360D6B8C8808610
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(kernel32.dll,007641BB,00764341,?,0076422F,?,007641BB,?,?,?,?,007639FE,?,00000001), ref: 00764359
                                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 0076436B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                              • API String ID: 2574300362-3689287502
                                                              • Opcode ID: c56ed9e8b0e1761bc0ad09ae5bf9aff481e3fd5978efc6359091bf6b39ab7595
                                                              • Instruction ID: 6c4d3c689031f5eeeaa043abd0631c5507d48ec68acc39f00533decdece8ea20
                                                              • Opcode Fuzzy Hash: c56ed9e8b0e1761bc0ad09ae5bf9aff481e3fd5978efc6359091bf6b39ab7595
                                                              • Instruction Fuzzy Hash: 07D0A7304007129FC7304F35E8486417AE8FF15715B01841DE896E6350D7BCDCC0C714
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,007A052F,?,007A06D7), ref: 007A0572
                                                              • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 007A0584
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                                              • API String ID: 2574300362-1587604923
                                                              • Opcode ID: 3bfbf528a598370255d2801e614016041e819f83a4dd35328810a0c9bfe0e469
                                                              • Instruction ID: 21c74de3adf0eff6f3e9cf7b09a4a2cc9fe45c675c1f4d194d7f77dfd8e3dfc1
                                                              • Opcode Fuzzy Hash: 3bfbf528a598370255d2801e614016041e819f83a4dd35328810a0c9bfe0e469
                                                              • Instruction Fuzzy Hash: E2D05E308007129AC7305F24A848B4277E8AF09301F11891DE851D2250DA78C8D48F60
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(oleaut32.dll,?,007A051D,?,007A05FE), ref: 007A0547
                                                              • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 007A0559
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: RegisterTypeLibForUser$oleaut32.dll
                                                              • API String ID: 2574300362-1071820185
                                                              • Opcode ID: bc9a03e003f0f12737d00378d6598968a26cf952924bd3634bd7a156f08a9c2c
                                                              • Instruction ID: cfe2f6d3518332ba7a8b7ae878f9c50de459c69f121fe6fed61ba69eb4838a31
                                                              • Opcode Fuzzy Hash: bc9a03e003f0f12737d00378d6598968a26cf952924bd3634bd7a156f08a9c2c
                                                              • Instruction Fuzzy Hash: 84D0A7748007129FCB309F24E848A41B6E8FF05301F15C81DE456D2250DA7CCCD08B51
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,007BECBE,?,007BEBBB), ref: 007BECD6
                                                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 007BECE8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                              • API String ID: 2574300362-1816364905
                                                              • Opcode ID: 396231c4ea0e88b7c6614da33229f8cb403a64d958b6bf74951da7e1383a14ca
                                                              • Instruction ID: f91f5b8c7646ac89ca14144edc90bda78659b9a90fa7c68cafbe1463bf7bb7a9
                                                              • Opcode Fuzzy Hash: 396231c4ea0e88b7c6614da33229f8cb403a64d958b6bf74951da7e1383a14ca
                                                              • Instruction Fuzzy Hash: 99D05E704017239ECB205B64E8887C27AE8EF08300B019419A855D2351DA78C8848664
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(kernel32.dll,00000000,007BBAD3,00000001,007BB6EE,?,007FDC00), ref: 007BBAEB
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 007BBAFD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: GetModuleHandleExW$kernel32.dll
                                                              • API String ID: 2574300362-199464113
                                                              • Opcode ID: 96cac1b41671e95dfd088ea69e9bf3d4236ed3d6e2d469370ddef687e11aca8d
                                                              • Instruction ID: 57eedb5a5f313cff534f0046832493fbeb0d7700cfe0b0b9bbe081f3a9d6e81a
                                                              • Opcode Fuzzy Hash: 96cac1b41671e95dfd088ea69e9bf3d4236ed3d6e2d469370ddef687e11aca8d
                                                              • Instruction Fuzzy Hash: EAD052B4800B129EC7309F25A888B9276E8EF08300B01842EA8A7D2250EBB8C880CA14
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,007C3BD1,?,007C3E06), ref: 007C3BE9
                                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 007C3BFB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                                              • API String ID: 2574300362-4033151799
                                                              • Opcode ID: 4b158efccb35b57186e0259e6ae0f86094db31ab8eae4ed7a9218c9678d2eab8
                                                              • Instruction ID: 31a23bc8f0652160fe4c5ad30752c8d142f39b461fc47bb05a86c5df8b73e003
                                                              • Opcode Fuzzy Hash: 4b158efccb35b57186e0259e6ae0f86094db31ab8eae4ed7a9218c9678d2eab8
                                                              • Instruction Fuzzy Hash: 98D05EB04007569ED7305B64E848A47BBA8AF15318F11C41DE455E6290D6BCC8808A20
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a911f0e3f2fae86d042b969d174c9e5d81d474346a745ec367660cad7ca3ef23
                                                              • Instruction ID: 0062dc178f5ca149f66466c439fd0e29eadb780d1d6eee2702dda2307311b2c6
                                                              • Opcode Fuzzy Hash: a911f0e3f2fae86d042b969d174c9e5d81d474346a745ec367660cad7ca3ef23
                                                              • Instruction Fuzzy Hash: FCC15F75A0021AEFEF14CFA8D884AAEB7B5FF48710F10459CEA059B251D734EE41DBA0
                                                              APIs
                                                              • CoInitialize.OLE32(00000000), ref: 007BAAB4
                                                              • CoUninitialize.OLE32 ref: 007BAABF
                                                                • Part of subcall function 007A0213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007A027B
                                                              • VariantInit.OLEAUT32(?), ref: 007BAACA
                                                              • VariantClear.OLEAUT32(?), ref: 007BAD9D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                              • String ID:
                                                              • API String ID: 780911581-0
                                                              • Opcode ID: 1bb12af92619106331c04acb0013bc8bea7e240b12566da0d433ec03265df855
                                                              • Instruction ID: 3c565ecd409811631c8946e856da9788be201f42af5fdff3c256a0c5e855b6db
                                                              • Opcode Fuzzy Hash: 1bb12af92619106331c04acb0013bc8bea7e240b12566da0d433ec03265df855
                                                              • Instruction Fuzzy Hash: F2A14875204701EFCB10EF15C485B5AB7E4BF88710F148449FA9AAB3A2CB38ED44CB96
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Variant$AllocClearCopyInitString
                                                              • String ID:
                                                              • API String ID: 2808897238-0
                                                              • Opcode ID: 8323afe2e53f55836872dd863df5a48f0cdc1c15d2766e374301582d7e6c3162
                                                              • Instruction ID: 66919de49241447ee7e3be43ae328661dda5f4d1f6757cd8645631af43127258
                                                              • Opcode Fuzzy Hash: 8323afe2e53f55836872dd863df5a48f0cdc1c15d2766e374301582d7e6c3162
                                                              • Instruction Fuzzy Hash: EC518430600306EBFF249F6DE495A2EB3A5AF55350F20C81FE64ACB2D1EB7898408705
                                                              APIs
                                                              • GetWindowRect.USER32(00D46C40,?), ref: 007CC544
                                                              • ScreenToClient.USER32(?,00000002), ref: 007CC574
                                                              • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 007CC5DA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$ClientMoveRectScreen
                                                              • String ID:
                                                              • API String ID: 3880355969-0
                                                              • Opcode ID: ec1bf1daa5f522391311e2cb0c34b1ad77990b005adf5e419c0b18e3657d9256
                                                              • Instruction ID: 11c2244f9e98e848db50b5ad1e2eb4361791e6f5f13c576c868839417346c926
                                                              • Opcode Fuzzy Hash: ec1bf1daa5f522391311e2cb0c34b1ad77990b005adf5e419c0b18e3657d9256
                                                              • Instruction Fuzzy Hash: 74514C75900208EFCF21DF68D884EAE7BB6BB59320F24825DF9199B290D734ED41CB90
                                                              APIs
                                                              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 0079C462
                                                              • __itow.LIBCMT ref: 0079C49C
                                                                • Part of subcall function 0079C6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 0079C753
                                                              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 0079C505
                                                              • __itow.LIBCMT ref: 0079C55A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$__itow
                                                              • String ID:
                                                              • API String ID: 3379773720-0
                                                              • Opcode ID: 3d376d45865a8ebea96d0ca46efc0cdd6815b30b392cd66de3e9c3b39e907130
                                                              • Instruction ID: 6c527f7515b08867bcc631e77406b0f13c579e33c03bbf66d1934eb0eaaaebdc
                                                              • Opcode Fuzzy Hash: 3d376d45865a8ebea96d0ca46efc0cdd6815b30b392cd66de3e9c3b39e907130
                                                              • Instruction Fuzzy Hash: CF41B871A00208EFDF26EF54D856FEE7BB9AF49700F000059F906A7291DB789E55CBA1
                                                              APIs
                                                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 007A3966
                                                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 007A3982
                                                              • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 007A39EF
                                                              • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 007A3A4D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: KeyboardState$InputMessagePostSend
                                                              • String ID:
                                                              • API String ID: 432972143-0
                                                              • Opcode ID: 323170cd650129fb613c819fbb19f3f94c7843161702f6028d730accc32fafd8
                                                              • Instruction ID: a0bfadc7f229350b7a958e810892610070878a27c544f2a64de98de10fba5357
                                                              • Opcode Fuzzy Hash: 323170cd650129fb613c819fbb19f3f94c7843161702f6028d730accc32fafd8
                                                              • Instruction Fuzzy Hash: 64411770A04258AAEF308F64880ABFEBBB59BCA314F04435AF4C1961C1C7BD9E85D765
                                                              APIs
                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 007AE742
                                                              • GetLastError.KERNEL32(?,00000000), ref: 007AE768
                                                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 007AE78D
                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 007AE7B9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                                              • String ID:
                                                              • API String ID: 3321077145-0
                                                              • Opcode ID: 97a924f9fd1241df695f2b470824ff571e76b33a767dadedf877c26677e825a9
                                                              • Instruction ID: a4fe80bee898a6570a978bb89234cebad16f49d9a7942a2ce71667f23b7c9b30
                                                              • Opcode Fuzzy Hash: 97a924f9fd1241df695f2b470824ff571e76b33a767dadedf877c26677e825a9
                                                              • Instruction Fuzzy Hash: 04410739600610DFCF11AF15C488A4DBBE5BF99710B098498EE46AB3A2CB38FD01CB95
                                                              APIs
                                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007CB5D1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: InvalidateRect
                                                              • String ID:
                                                              • API String ID: 634782764-0
                                                              • Opcode ID: 8f3fbd133d977ef60fa6cd18dbf63223c0a1cd8f1c2bf3c19811a8254413e340
                                                              • Instruction ID: 94fd153397af6f22e926414df39b60b603f5cd7172c4a25530c13cbd3f3c18f5
                                                              • Opcode Fuzzy Hash: 8f3fbd133d977ef60fa6cd18dbf63223c0a1cd8f1c2bf3c19811a8254413e340
                                                              • Instruction Fuzzy Hash: CB31DC34601208FFEF308F18DC8AFAC7765AB0A350F64811DFA11E62E1C738E9608B56
                                                              APIs
                                                              • ClientToScreen.USER32(?,?), ref: 007CD807
                                                              • GetWindowRect.USER32(?,?), ref: 007CD87D
                                                              • PtInRect.USER32(?,?,007CED5A), ref: 007CD88D
                                                              • MessageBeep.USER32(00000000), ref: 007CD8FE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Rect$BeepClientMessageScreenWindow
                                                              • String ID:
                                                              • API String ID: 1352109105-0
                                                              • Opcode ID: 3870b7edca37baca86e5965671204573d90188d06e65eb54a12bf5520802141d
                                                              • Instruction ID: 7f63cc19c463a606e3d28af2200c733176210faa9dcb2159db8a0e00c7849028
                                                              • Opcode Fuzzy Hash: 3870b7edca37baca86e5965671204573d90188d06e65eb54a12bf5520802141d
                                                              • Instruction Fuzzy Hash: 8E415674A00219DFCB21DF58D888FA9BBF5BB99310F2881BDE8159B260D738ED45CB40
                                                              APIs
                                                              • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 007A3AB8
                                                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 007A3AD4
                                                              • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 007A3B34
                                                              • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 007A3B92
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: KeyboardState$InputMessagePostSend
                                                              • String ID:
                                                              • API String ID: 432972143-0
                                                              • Opcode ID: 96949939b33e1bbf8944490e28fc39ea26ac2f94575c75fd4405ab99bcd3c46e
                                                              • Instruction ID: 029f45b5292043b812b4af756a4b0abd2c227fb43e13b569f8d59acb97963efa
                                                              • Opcode Fuzzy Hash: 96949939b33e1bbf8944490e28fc39ea26ac2f94575c75fd4405ab99bcd3c46e
                                                              • Instruction Fuzzy Hash: 6331F4B0A04298AEEB348F648819BBE7BA69BD7310F04035AF481961D2C77D8F85D775
                                                              APIs
                                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00794038
                                                              • __isleadbyte_l.LIBCMT ref: 00794066
                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00794094
                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 007940CA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                              • String ID:
                                                              • API String ID: 3058430110-0
                                                              • Opcode ID: 4bd02eca16e1b37ff34ef86c48640f6158356a5ecfdb0fe368f280f586ccba0f
                                                              • Instruction ID: ded257e16f334b4f37fca86f87dbe4cf1ca0c7abf301e294b0356408c6b10856
                                                              • Opcode Fuzzy Hash: 4bd02eca16e1b37ff34ef86c48640f6158356a5ecfdb0fe368f280f586ccba0f
                                                              • Instruction Fuzzy Hash: AD31D23160020AEFDF219F38D848FAA7BA5BF41310F1580A8E6658B0A0E739DC92D790
                                                              APIs
                                                              • GetForegroundWindow.USER32 ref: 007C7CB9
                                                                • Part of subcall function 007A5F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 007A5F6F
                                                                • Part of subcall function 007A5F55: GetCurrentThreadId.KERNEL32 ref: 007A5F76
                                                                • Part of subcall function 007A5F55: AttachThreadInput.USER32(00000000,?,007A781F), ref: 007A5F7D
                                                              • GetCaretPos.USER32(?), ref: 007C7CCA
                                                              • ClientToScreen.USER32(00000000,?), ref: 007C7D03
                                                              • GetForegroundWindow.USER32 ref: 007C7D09
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                              • String ID:
                                                              • API String ID: 2759813231-0
                                                              • Opcode ID: 9ab71c459d2dc12524d4f6a3f0bae8d0b8d5fdce2817c6c3d3fb85af3c192818
                                                              • Instruction ID: 3bf03ecc06c55f2c968fdb7688116ded70b2ea7eeaf9937c2c97cde21455f58f
                                                              • Opcode Fuzzy Hash: 9ab71c459d2dc12524d4f6a3f0bae8d0b8d5fdce2817c6c3d3fb85af3c192818
                                                              • Instruction Fuzzy Hash: 8F312172900108AFDB11EFA5DC859EFBBFDEF59310B10846AE819E7211DA359E05CFA0
                                                              APIs
                                                                • Part of subcall function 0077B34E: GetWindowLongW.USER32(?,000000EB), ref: 0077B35F
                                                              • GetCursorPos.USER32(?), ref: 007CF211
                                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,007DE4C0,?,?,?,?,?), ref: 007CF226
                                                              • GetCursorPos.USER32(?), ref: 007CF270
                                                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,007DE4C0,?,?,?), ref: 007CF2A6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                              • String ID:
                                                              • API String ID: 2864067406-0
                                                              • Opcode ID: 4d39be1d8c921f7b8fa656afba33a2e064330a4047c6a634be99eb8e61f51f0f
                                                              • Instruction ID: f06dfa96ce1785765d6cbbfa5dbbbd8c73c87944aee63e03cf79cb114ab5bdc1
                                                              • Opcode Fuzzy Hash: 4d39be1d8c921f7b8fa656afba33a2e064330a4047c6a634be99eb8e61f51f0f
                                                              • Instruction Fuzzy Hash: 2A216D39501018EFCB258F94D898EFE7BB6FB09720F14806DF9058B2A1D3389E51DB50
                                                              APIs
                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007B4358
                                                                • Part of subcall function 007B43E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007B4401
                                                                • Part of subcall function 007B43E2: InternetCloseHandle.WININET(00000000), ref: 007B449E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Internet$CloseConnectHandleOpen
                                                              • String ID:
                                                              • API String ID: 1463438336-0
                                                              • Opcode ID: 9311839f512cc18a10a2ca9a23ab543a9e6a78cca4e52698c1f329ff7dae0eae
                                                              • Instruction ID: 0a7e3bb4708408ad5b530cfa5085cdd99d3e5c00f9206f899905c38d17c22b55
                                                              • Opcode Fuzzy Hash: 9311839f512cc18a10a2ca9a23ab543a9e6a78cca4e52698c1f329ff7dae0eae
                                                              • Instruction Fuzzy Hash: CB219F35201705BBEB219F609C40FFBB7E9FF48710F18401ABA15AB652DB79D82197A4
                                                              APIs
                                                              • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 007B8AE0
                                                              • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 007B8AF2
                                                              • accept.WSOCK32(00000000,00000000,00000000), ref: 007B8AFF
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 007B8B16
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastacceptselect
                                                              • String ID:
                                                              • API String ID: 385091864-0
                                                              • Opcode ID: 83b3053f1579c807e2d567b0e3f7ddb9746df677618fa26c16dd31f6158c9f86
                                                              • Instruction ID: 3661a262dd2d0300be36bae7a6f9f57ceb007e7afaf37a22b1d625e2d72c9414
                                                              • Opcode Fuzzy Hash: 83b3053f1579c807e2d567b0e3f7ddb9746df677618fa26c16dd31f6158c9f86
                                                              • Instruction Fuzzy Hash: 29219672A001249FC7219F68C885ADE7BECEF5A350F008169F849DB251DB78DD41CF90
                                                              APIs
                                                              • GetWindowLongW.USER32(?,000000EC), ref: 007C8AA6
                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 007C8AC0
                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 007C8ACE
                                                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 007C8ADC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$Long$AttributesLayered
                                                              • String ID:
                                                              • API String ID: 2169480361-0
                                                              • Opcode ID: 2b49e1def7d873444bb1920bc009496a7022d95421d732194eef17b718f7bb31
                                                              • Instruction ID: 2b233cc7e434666a43e560e35c48fd09e4b0d14566f3b80d4defdb2d2e9aded8
                                                              • Opcode Fuzzy Hash: 2b49e1def7d873444bb1920bc009496a7022d95421d732194eef17b718f7bb31
                                                              • Instruction Fuzzy Hash: 3E11BE31305510AFDB55AB18CC49FBE7799BF8A320F14811EF816CB2E2CB78AC118795
                                                              APIs
                                                                • Part of subcall function 007A1E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,007A0ABB,?,?,?,007A187A,00000000,000000EF,00000119,?,?), ref: 007A1E77
                                                                • Part of subcall function 007A1E68: lstrcpyW.KERNEL32(00000000,?,?,007A0ABB,?,?,?,007A187A,00000000,000000EF,00000119,?,?,00000000), ref: 007A1E9D
                                                                • Part of subcall function 007A1E68: lstrcmpiW.KERNEL32(00000000,?,007A0ABB,?,?,?,007A187A,00000000,000000EF,00000119,?,?), ref: 007A1ECE
                                                              • lstrlenW.KERNEL32(?,00000002,?,?,?,?,007A187A,00000000,000000EF,00000119,?,?,00000000), ref: 007A0AD4
                                                              • lstrcpyW.KERNEL32(00000000,?,?,007A187A,00000000,000000EF,00000119,?,?,00000000), ref: 007A0AFA
                                                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,007A187A,00000000,000000EF,00000119,?,?,00000000), ref: 007A0B2E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: lstrcmpilstrcpylstrlen
                                                              • String ID: cdecl
                                                              • API String ID: 4031866154-3896280584
                                                              • Opcode ID: 538b5eddce9e5f50467d320b92531e9559b1568fc5a281d20e7296fb75bd585c
                                                              • Instruction ID: 1a718b7f484df8db1e86b55040e86b383a625fdcb03eee8cb00f36256ca48413
                                                              • Opcode Fuzzy Hash: 538b5eddce9e5f50467d320b92531e9559b1568fc5a281d20e7296fb75bd585c
                                                              • Instruction Fuzzy Hash: CE11B176200345EFDB25AF24DC45E7A77A9FF8A350F80862AE806CB250EB759850C7E1
                                                              APIs
                                                              • _free.LIBCMT ref: 00792FB5
                                                                • Part of subcall function 0078395C: __FF_MSGBANNER.LIBCMT ref: 00783973
                                                                • Part of subcall function 0078395C: __NMSG_WRITE.LIBCMT ref: 0078397A
                                                                • Part of subcall function 0078395C: RtlAllocateHeap.NTDLL(00D20000,00000000,00000001,00000001,00000000,?,?,0077F507,?,0000000E), ref: 0078399F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: AllocateHeap_free
                                                              • String ID:
                                                              • API String ID: 614378929-0
                                                              • Opcode ID: 669c5730addc00b2500b1d357e0b875620bd7ee8d8c13668a42cd7bb74576a21
                                                              • Instruction ID: d0df2222bd52a29f18ff3e3d46c96a28ceb1ac1d909aa206dc0e93fc48faa1af
                                                              • Opcode Fuzzy Hash: 669c5730addc00b2500b1d357e0b875620bd7ee8d8c13668a42cd7bb74576a21
                                                              • Instruction Fuzzy Hash: 3611CA31549211EBDF353F74BC496693BA9AF04360F208925F84A9A162DB3CCD41DBA0
                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 007A05AC
                                                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 007A05C7
                                                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 007A05DD
                                                              • FreeLibrary.KERNEL32(?), ref: 007A0632
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                                              • String ID:
                                                              • API String ID: 3137044355-0
                                                              • Opcode ID: 7610efeabbada37e14bb38f03052b162b799256c7a9d9288c4a7946b09963d6c
                                                              • Instruction ID: 1836ec5ca35407ea80a14d7dcc68efe4b18f0d4205b791a29579961169fc5af9
                                                              • Opcode Fuzzy Hash: 7610efeabbada37e14bb38f03052b162b799256c7a9d9288c4a7946b09963d6c
                                                              • Instruction Fuzzy Hash: 3321D071900208EFDB20CFA0DD88ADABBB8EF85308F008A6DE51696050D779EA54DF91
                                                              APIs
                                                              • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 007A6733
                                                              • _memset.LIBCMT ref: 007A6754
                                                              • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 007A67A6
                                                              • CloseHandle.KERNEL32(00000000), ref: 007A67AF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CloseControlCreateDeviceFileHandle_memset
                                                              • String ID:
                                                              • API String ID: 1157408455-0
                                                              • Opcode ID: a0a9063cdca7e14e060b95365b2474d8fda43ea1188c054390dc6c090c382e65
                                                              • Instruction ID: ca7c222047a0b8a56f0d6314a7f0d0bd0dc1d8ae74c0ca3eb2cbfca59f0e1e7c
                                                              • Opcode Fuzzy Hash: a0a9063cdca7e14e060b95365b2474d8fda43ea1188c054390dc6c090c382e65
                                                              • Instruction Fuzzy Hash: 4C11CA75901228BAE73057A5AC4DFABBABCEF45764F10429AF504E71D0D6744E808BB8
                                                              APIs
                                                                • Part of subcall function 0079AA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0079AA79
                                                                • Part of subcall function 0079AA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0079AA83
                                                                • Part of subcall function 0079AA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0079AA92
                                                                • Part of subcall function 0079AA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0079AA99
                                                                • Part of subcall function 0079AA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0079AAAF
                                                              • GetLengthSid.ADVAPI32(?,00000000,0079ADE4,?,?), ref: 0079B21B
                                                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0079B227
                                                              • HeapAlloc.KERNEL32(00000000), ref: 0079B22E
                                                              • CopySid.ADVAPI32(?,00000000,?), ref: 0079B247
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
                                                              • String ID:
                                                              • API String ID: 4217664535-0
                                                              • Opcode ID: e5eb81fbf95712f6ded0b987cfcf352c3eb40d123305ec8ef23bc90c12fadc16
                                                              • Instruction ID: a808db170c43fa95ab9a34e9ae2e32f6b0feb25c9eba96bef73a2858c2c5ae5a
                                                              • Opcode Fuzzy Hash: e5eb81fbf95712f6ded0b987cfcf352c3eb40d123305ec8ef23bc90c12fadc16
                                                              • Instruction Fuzzy Hash: 0C118C71A01205FFDF149F98ED85AAEB7A9FF89314B24802DE9429B210D779AE44CB50
                                                              APIs
                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 0079B498
                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0079B4AA
                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0079B4C0
                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0079B4DB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID:
                                                              • API String ID: 3850602802-0
                                                              • Opcode ID: b6c65891e755026f328a9d06dce404224e4feed6ef7c78bc64e8670213dae97d
                                                              • Instruction ID: ae7d1cae38b467b3b3b9f0ca4ad38481634c0a5964568fa65091a2b6f629d6a9
                                                              • Opcode Fuzzy Hash: b6c65891e755026f328a9d06dce404224e4feed6ef7c78bc64e8670213dae97d
                                                              • Instruction Fuzzy Hash: CC115A7A900218FFDF11DFA8D985E9DBBB4FB08700F204091E604B7290D771AE10EB94
                                                              APIs
                                                                • Part of subcall function 0077B34E: GetWindowLongW.USER32(?,000000EB), ref: 0077B35F
                                                              • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 0077B5A5
                                                              • GetClientRect.USER32(?,?), ref: 007DE69A
                                                              • GetCursorPos.USER32(?), ref: 007DE6A4
                                                              • ScreenToClient.USER32(?,?), ref: 007DE6AF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Client$CursorLongProcRectScreenWindow
                                                              • String ID:
                                                              • API String ID: 4127811313-0
                                                              • Opcode ID: 31bae0397a1e05ad145096e746d55dde9ecdd225555cb65f638c16a7cb22411c
                                                              • Instruction ID: e1322276b2e99811fbb2dd62f6b5801a6184321349f453e1a756aa0687abfc8d
                                                              • Opcode Fuzzy Hash: 31bae0397a1e05ad145096e746d55dde9ecdd225555cb65f638c16a7cb22411c
                                                              • Instruction Fuzzy Hash: 8A113A31501029FFCF10EFA4DC899BE77B8EB08344F108455F905EB140D338AA95CBA5
                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 007A7352
                                                              • MessageBoxW.USER32(?,?,?,?), ref: 007A7385
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 007A739B
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 007A73A2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                              • String ID:
                                                              • API String ID: 2880819207-0
                                                              • Opcode ID: dc7b3f0e29ba2f30743b81698a449440b3af90090930e69b13c8e18d30da887b
                                                              • Instruction ID: 6a88ce65fe70fd48a47c2aa8f2a7fe03c8bcd08a0ba97602e99ca4e1f7e9a348
                                                              • Opcode Fuzzy Hash: dc7b3f0e29ba2f30743b81698a449440b3af90090930e69b13c8e18d30da887b
                                                              • Instruction Fuzzy Hash: 62110872A04244EFCB159B68DC49A9E7BADEB8A311F148315F921D32A1D6788D0187A4
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0077D1BA
                                                              • GetStockObject.GDI32(00000011), ref: 0077D1CE
                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 0077D1D8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CreateMessageObjectSendStockWindow
                                                              • String ID:
                                                              • API String ID: 3970641297-0
                                                              • Opcode ID: e8c5e0be70704bbf429dcf25279e573b2c058581f31e438eb0572d8cfc819f64
                                                              • Instruction ID: 5ef36e92c73cce54f34ce0ba0e70cad1663926bfa3dc1be5abdabccab34534ab
                                                              • Opcode Fuzzy Hash: e8c5e0be70704bbf429dcf25279e573b2c058581f31e438eb0572d8cfc819f64
                                                              • Instruction Fuzzy Hash: 1C11A17210254DBFEF224F909C54EEA7B7AFF1C3A5F458101FA0856150C7399C619BA0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                              • String ID:
                                                              • API String ID: 3016257755-0
                                                              • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                              • Instruction ID: 9a39ae061d7e03511f92067470028919439b47f056a2312aee299f1b93face63
                                                              • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                              • Instruction Fuzzy Hash: 9D01363200014AFBCF125E94EC16CEE3F22BB18354B598455FA2859131D33ACAB2AB81
                                                              APIs
                                                                • Part of subcall function 00787A0D: __getptd_noexit.LIBCMT ref: 00787A0E
                                                              • __lock.LIBCMT ref: 0078748F
                                                              • InterlockedDecrement.KERNEL32(?), ref: 007874AC
                                                              • _free.LIBCMT ref: 007874BF
                                                              • InterlockedIncrement.KERNEL32(00D33720), ref: 007874D7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                              • String ID:
                                                              • API String ID: 2704283638-0
                                                              • Opcode ID: 1dbdf8137034a7c799f5f6f5df4beca17a3dfb9b70d2a3ababfccea6a812b0f2
                                                              • Instruction ID: 35ccdde7bf5cd7ffd1bfbcef22d1bac06c8ff14f8b60cde42745929e6ebb60c8
                                                              • Opcode Fuzzy Hash: 1dbdf8137034a7c799f5f6f5df4beca17a3dfb9b70d2a3ababfccea6a812b0f2
                                                              • Instruction Fuzzy Hash: 1A01843298A651EBC72EBF64944979DBB64BF04720F248005F42AB7690C73C9941CFD6
                                                              APIs
                                                              • _memset.LIBCMT ref: 007CE33D
                                                              • _memset.LIBCMT ref: 007CE34C
                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00823D00,00823D44), ref: 007CE37B
                                                              • CloseHandle.KERNEL32 ref: 007CE38D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _memset$CloseCreateHandleProcess
                                                              • String ID:
                                                              • API String ID: 3277943733-0
                                                              • Opcode ID: 4faad7189c4b751c2ca43ad3aabe3a079187f37f2a94af9d9f980268d8a58cc3
                                                              • Instruction ID: eaa0f31aa7ba77a945c9d252bccaf4c1794dcacf78c3ca6a1b4cb89fa83601c9
                                                              • Opcode Fuzzy Hash: 4faad7189c4b751c2ca43ad3aabe3a079187f37f2a94af9d9f980268d8a58cc3
                                                              • Instruction Fuzzy Hash: E7F054F1640354BAE2602760AC55F777E5CE704754F008421BF04EA1A2D37D5D1147B8
                                                              APIs
                                                                • Part of subcall function 0077AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0077AFE3
                                                                • Part of subcall function 0077AF83: SelectObject.GDI32(?,00000000), ref: 0077AFF2
                                                                • Part of subcall function 0077AF83: BeginPath.GDI32(?), ref: 0077B009
                                                                • Part of subcall function 0077AF83: SelectObject.GDI32(?,00000000), ref: 0077B033
                                                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 007CEA8E
                                                              • LineTo.GDI32(00000000,?,?), ref: 007CEA9B
                                                              • EndPath.GDI32(00000000), ref: 007CEAAB
                                                              • StrokePath.GDI32(00000000), ref: 007CEAB9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                              • String ID:
                                                              • API String ID: 1539411459-0
                                                              • Opcode ID: 27862cc81ad4b7fc308b9e90cc86886980b487c35c42b65eeb0a65efaa663df6
                                                              • Instruction ID: efd8ebb98cd0a477154cbba19244b000b6b62630513c46ad3016122cf82eb7ea
                                                              • Opcode Fuzzy Hash: 27862cc81ad4b7fc308b9e90cc86886980b487c35c42b65eeb0a65efaa663df6
                                                              • Instruction Fuzzy Hash: 61F05E31006299BBDF229F94AC4DFCE3F19AF1A321F18C105FE11690E1877D9962CB99
                                                              APIs
                                                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0079C84A
                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0079C85D
                                                              • GetCurrentThreadId.KERNEL32 ref: 0079C864
                                                              • AttachThreadInput.USER32(00000000), ref: 0079C86B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                              • String ID:
                                                              • API String ID: 2710830443-0
                                                              • Opcode ID: b74e72bc1402c97772541035a56d61cf52b0db948ac2f75dac8bffc5341f3930
                                                              • Instruction ID: f5132785a0a60691ce03cd9f530305bc55577c892dc780a78d8cc66ef1ded8ba
                                                              • Opcode Fuzzy Hash: b74e72bc1402c97772541035a56d61cf52b0db948ac2f75dac8bffc5341f3930
                                                              • Instruction Fuzzy Hash: 7AE065711422A87BDF211B61EC4DEDB7F1CEF0A7A1F00C011B60D88450C679C981C7E0
                                                              APIs
                                                              • GetCurrentThread.KERNEL32 ref: 0079B0D6
                                                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,0079AC9D), ref: 0079B0DD
                                                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0079AC9D), ref: 0079B0EA
                                                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,0079AC9D), ref: 0079B0F1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CurrentOpenProcessThreadToken
                                                              • String ID:
                                                              • API String ID: 3974789173-0
                                                              • Opcode ID: 6091ceb3923ec5e0761081870b9beeaf9d54ddeb51f88d4c5f179944362aa1c9
                                                              • Instruction ID: ebd976377aaefc42da7f3c001a93dfb5e75f4c9a74c8ba2b36539cc236fb1b49
                                                              • Opcode Fuzzy Hash: 6091ceb3923ec5e0761081870b9beeaf9d54ddeb51f88d4c5f179944362aa1c9
                                                              • Instruction Fuzzy Hash: 7FE08632602211DBDB301FB56D4DB873BA8EF59791F01C828F241DE040DB7C9801C764
                                                              APIs
                                                              • GetSysColor.USER32(00000008), ref: 0077B496
                                                              • SetTextColor.GDI32(?,000000FF), ref: 0077B4A0
                                                              • SetBkMode.GDI32(?,00000001), ref: 0077B4B5
                                                              • GetStockObject.GDI32(00000005), ref: 0077B4BD
                                                              • GetWindowDC.USER32(?,00000000), ref: 007DDE2B
                                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 007DDE38
                                                              • GetPixel.GDI32(00000000,?,00000000), ref: 007DDE51
                                                              • GetPixel.GDI32(00000000,00000000,?), ref: 007DDE6A
                                                              • GetPixel.GDI32(00000000,?,?), ref: 007DDE8A
                                                              • ReleaseDC.USER32(?,00000000), ref: 007DDE95
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                              • String ID:
                                                              • API String ID: 1946975507-0
                                                              • Opcode ID: 08b842bff5a436a2b038625e89cbd79e1d0c33e3efb7a34c599045b8251f0a91
                                                              • Instruction ID: cb7b0de19809837f73b1d1f16c6d643451789bee8e913643164c0f206fbe3815
                                                              • Opcode Fuzzy Hash: 08b842bff5a436a2b038625e89cbd79e1d0c33e3efb7a34c599045b8251f0a91
                                                              • Instruction Fuzzy Hash: 1FE0ED31101284AADF315F64AC4DBD83B21AB59339F14C666F6A95C0E1D7BA4D81DB11
                                                              APIs
                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0079B2DF
                                                              • UnloadUserProfile.USERENV(?,?), ref: 0079B2EB
                                                              • CloseHandle.KERNEL32(?), ref: 0079B2F4
                                                              • CloseHandle.KERNEL32(?), ref: 0079B2FC
                                                                • Part of subcall function 0079AB24: GetProcessHeap.KERNEL32(00000000,?,0079A848), ref: 0079AB2B
                                                                • Part of subcall function 0079AB24: HeapFree.KERNEL32(00000000), ref: 0079AB32
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                              • String ID:
                                                              • API String ID: 146765662-0
                                                              • Opcode ID: abcbfc6e07ccf2b423b5a7ee599d23c781df9dd437a3d1e961de47c408aa88da
                                                              • Instruction ID: 620d2bd3750b245b2667a2a0f68df38533b356bb9de09f9ecf60c9b364edbc55
                                                              • Opcode Fuzzy Hash: abcbfc6e07ccf2b423b5a7ee599d23c781df9dd437a3d1e961de47c408aa88da
                                                              • Instruction Fuzzy Hash: 87E0B63A105045FBCB112BA5EC48859FBAAFF9C321710C221F62585575CB3BA871EB95
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                              • String ID:
                                                              • API String ID: 2889604237-0
                                                              • Opcode ID: 903b8edac92f630d00a1d1d6a3a2a417387081fb094d42a52394357567da36d8
                                                              • Instruction ID: c8bd1ce3b5f9479aeeff159bbd7dc27459fcf26b82642b38fd835684e88f3907
                                                              • Opcode Fuzzy Hash: 903b8edac92f630d00a1d1d6a3a2a417387081fb094d42a52394357567da36d8
                                                              • Instruction Fuzzy Hash: 77E01AB1100244EFDB215F70888862D7BB9EB4C390F11C80AF95E8B211DA7D9C418B54
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                              • String ID:
                                                              • API String ID: 2889604237-0
                                                              • Opcode ID: 381d684ff4b6585921ec2843560a06d917b612ce8bb62600df4e6ec5df875451
                                                              • Instruction ID: 4850db4f6da5198cf5d8f27d095a0aa84d9efb7675918c516ff8ce37f442577e
                                                              • Opcode Fuzzy Hash: 381d684ff4b6585921ec2843560a06d917b612ce8bb62600df4e6ec5df875451
                                                              • Instruction Fuzzy Hash: AAE012B1500240EFDF215F7088886297BA9EB4C390F11C809F95E8B211DA7EAC018B18
                                                              APIs
                                                              • OleSetContainedObject.OLE32(?,00000001), ref: 0079DEAA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ContainedObject
                                                              • String ID: AutoIt3GUI$Container
                                                              • API String ID: 3565006973-3941886329
                                                              • Opcode ID: e11ca3402fa455a99e66d245ab5d216eda74e8cd74683ffaed17144ece085e5d
                                                              • Instruction ID: 2450e35bb0afa844c5ec09c57de784b61246c85b3915bfdabbd97cd8ce7d79e4
                                                              • Opcode Fuzzy Hash: e11ca3402fa455a99e66d245ab5d216eda74e8cd74683ffaed17144ece085e5d
                                                              • Instruction Fuzzy Hash: DD914774600601AFDB24CF64D889B6AB7B9FF48710F20856EF95ACB691DB74EC41CB60
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _wcscpy
                                                              • String ID: I/}$I/}
                                                              • API String ID: 3048848545-3623143299
                                                              • Opcode ID: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                                              • Instruction ID: ef8a3adfee860c6b8f114b5520234d5175e61399b1463e024f62f373700a37b7
                                                              • Opcode Fuzzy Hash: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                                              • Instruction Fuzzy Hash: 0741C235900116AACF25EF9CC4419FDB770EF8A710F54924AE881B7192DA386E83D760
                                                              APIs
                                                              • Sleep.KERNEL32(00000000), ref: 0077BCDA
                                                              • GlobalMemoryStatusEx.KERNEL32 ref: 0077BCF3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: GlobalMemorySleepStatus
                                                              • String ID: @
                                                              • API String ID: 2783356886-2766056989
                                                              • Opcode ID: f4a5c3bf39f172cb8e0d869b0114a2cd5cdac06cd2d2489d8d00bffb06dabb26
                                                              • Instruction ID: 4c225e87c4f5af8dd5dfa7f22da76f67c95b5e4a2e88432076695866258f132d
                                                              • Opcode Fuzzy Hash: f4a5c3bf39f172cb8e0d869b0114a2cd5cdac06cd2d2489d8d00bffb06dabb26
                                                              • Instruction Fuzzy Hash: 14513871408744DBE720AF14DC89BAFBBECFF94394F41884DF1D8410A2DB7495A98B66
                                                              APIs
                                                                • Part of subcall function 007644ED: __fread_nolock.LIBCMT ref: 0076450B
                                                              • _wcscmp.LIBCMT ref: 007AC65D
                                                              • _wcscmp.LIBCMT ref: 007AC670
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: _wcscmp$__fread_nolock
                                                              • String ID: FILE
                                                              • API String ID: 4029003684-3121273764
                                                              • Opcode ID: fc21dfed06679530641fb8c4066db3eed433e08d96cead4d5472be1603c5f7ac
                                                              • Instruction ID: ad0a95335c00f42e922d510eca21ba3679a4345dcbd2b00b97bd963eaec34d5b
                                                              • Opcode Fuzzy Hash: fc21dfed06679530641fb8c4066db3eed433e08d96cead4d5472be1603c5f7ac
                                                              • Instruction Fuzzy Hash: 5741D972A0024ABBDF11EAA4DC46FEF7BB9EF89714F000069F905E7181DA789A04C751
                                                              APIs
                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 007CA85A
                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007CA86F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: '
                                                              • API String ID: 3850602802-1997036262
                                                              • Opcode ID: bce91bcbce03300372a442627eff17f691350f0d9469cc7bb359d571251ebf05
                                                              • Instruction ID: 1c80900ac58e695c82865d087f79f9739dce06f42e78086eaccc4ea9ae98e77e
                                                              • Opcode Fuzzy Hash: bce91bcbce03300372a442627eff17f691350f0d9469cc7bb359d571251ebf05
                                                              • Instruction Fuzzy Hash: 3E41F574E01209AFDB54CFA8C884FDA7BB9FB08305F14016EE905AB381D774A942CFA1
                                                              APIs
                                                              • DestroyWindow.USER32(?,?,?,?), ref: 007C980E
                                                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 007C984A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$DestroyMove
                                                              • String ID: static
                                                              • API String ID: 2139405536-2160076837
                                                              • Opcode ID: fa2f0d7256f4c7834403c5b581c9867da81394795c1b462e73d03bb5352b2be0
                                                              • Instruction ID: b875469f3838289d38db7247fb6c558150404686da02866d693b8cf299d34987
                                                              • Opcode Fuzzy Hash: fa2f0d7256f4c7834403c5b581c9867da81394795c1b462e73d03bb5352b2be0
                                                              • Instruction Fuzzy Hash: 46316B71110604AAEB209F78CC85FFB73A9FF59760F10861DF9A9C7190DA39AC81C764
                                                              APIs
                                                              • _memset.LIBCMT ref: 007A51C6
                                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007A5201
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: InfoItemMenu_memset
                                                              • String ID: 0
                                                              • API String ID: 2223754486-4108050209
                                                              • Opcode ID: aa6ad51817fadaf80ad6bd77ca357f86c77d3fd817b127c60193fae431249207
                                                              • Instruction ID: e0c7f02aad82af900ad24a73dd3b13a42e68b15ccd2a46cde6aa1400eba5ba86
                                                              • Opcode Fuzzy Hash: aa6ad51817fadaf80ad6bd77ca357f86c77d3fd817b127c60193fae431249207
                                                              • Instruction Fuzzy Hash: 623191B1600604DBEB24CF99D889BAEBBF5BFC6350F144229E985A61E0D7789A44CB50
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: __snwprintf
                                                              • String ID: , $$AUTOITCALLVARIABLE%d
                                                              • API String ID: 2391506597-2584243854
                                                              • Opcode ID: 69d0153161dcde94f48d928c6f0c486440371d764a50b982d2831996d754aec7
                                                              • Instruction ID: 9199923f6f6a79d01631ee8c9026cfb15e01c046a6735d862e90aa0f583e6cab
                                                              • Opcode Fuzzy Hash: 69d0153161dcde94f48d928c6f0c486440371d764a50b982d2831996d754aec7
                                                              • Instruction Fuzzy Hash: A2215E71600218EBCF15EF64D886BED77B5BF45744F000469F906EB241DA7CEA45CBA1
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 007C945C
                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007C9467
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: Combobox
                                                              • API String ID: 3850602802-2096851135
                                                              • Opcode ID: 86f1e60c06c3ec1c4bace9fc421db3d53b229bcb18ddc7acaaeff877d34a1123
                                                              • Instruction ID: ee95f67ffc1bd5c37d63adc6aedc6122874da3d86efcc92deba70d2c72eace06
                                                              • Opcode Fuzzy Hash: 86f1e60c06c3ec1c4bace9fc421db3d53b229bcb18ddc7acaaeff877d34a1123
                                                              • Instruction Fuzzy Hash: CF1190B1200248AFEF659E54DC88FAB376EEB583A4F10412DFA1897290D7399C528760
                                                              APIs
                                                                • Part of subcall function 0077B34E: GetWindowLongW.USER32(?,000000EB), ref: 0077B35F
                                                              • GetActiveWindow.USER32 ref: 007CDA7B
                                                              • EnumChildWindows.USER32(?,007CD75F,00000000), ref: 007CDAF5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$ActiveChildEnumLongWindows
                                                              • String ID: T1{
                                                              • API String ID: 3814560230-2508124280
                                                              • Opcode ID: 6e1714d271b54f7c5691db7f0fa394d56586d6f51926d2d318ad4df4d755bb97
                                                              • Instruction ID: aba6e9324e79f79eab8f55e95ae26dd84c61fd3e2b9dda33717fab328dbef27e
                                                              • Opcode Fuzzy Hash: 6e1714d271b54f7c5691db7f0fa394d56586d6f51926d2d318ad4df4d755bb97
                                                              • Instruction Fuzzy Hash: 61210C75204201DFCB24DF68D858AA977E5FB69320F25462DE96A873E0D734AC41CB50
                                                              APIs
                                                                • Part of subcall function 0077D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0077D1BA
                                                                • Part of subcall function 0077D17C: GetStockObject.GDI32(00000011), ref: 0077D1CE
                                                                • Part of subcall function 0077D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0077D1D8
                                                              • GetWindowRect.USER32(00000000,?), ref: 007C9968
                                                              • GetSysColor.USER32(00000012), ref: 007C9982
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                              • String ID: static
                                                              • API String ID: 1983116058-2160076837
                                                              • Opcode ID: 51bc578d0b52e6539b43e2ae68aa009ee4c46f1e9453d2b972b41b866bbcaebb
                                                              • Instruction ID: 05bbf2dd5af4f98835b495b8231146237ab58d742bcaa393245b96a6c631835d
                                                              • Opcode Fuzzy Hash: 51bc578d0b52e6539b43e2ae68aa009ee4c46f1e9453d2b972b41b866bbcaebb
                                                              • Instruction Fuzzy Hash: 8E111472520209AFDB14DFB8C849EEA7BA8FB48354F01462CFA55E2250E639E851DB60
                                                              APIs
                                                              • GetWindowTextLengthW.USER32(00000000), ref: 007C9699
                                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007C96A8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: LengthMessageSendTextWindow
                                                              • String ID: edit
                                                              • API String ID: 2978978980-2167791130
                                                              • Opcode ID: fd84edd7a6df56be77056ca3fdfcc8d8778ef8d247b423c66c9efd2f62b49b96
                                                              • Instruction ID: 7601707674e74d7e3dc1667410ff940015d2811e9aecaaa407aafca8558d1f07
                                                              • Opcode Fuzzy Hash: fd84edd7a6df56be77056ca3fdfcc8d8778ef8d247b423c66c9efd2f62b49b96
                                                              • Instruction Fuzzy Hash: 7C115871500108AAEF619F649C88FEB3B6AEB153B8F50431CFA65A72E0C639DC519764
                                                              APIs
                                                              • _memset.LIBCMT ref: 007A52D5
                                                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 007A52F4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: InfoItemMenu_memset
                                                              • String ID: 0
                                                              • API String ID: 2223754486-4108050209
                                                              • Opcode ID: 078e592c1d39f33d3a33c40349e42acb8d106e1fd534ab1a2253029eef1bbc4d
                                                              • Instruction ID: 10a5a9d84968fa9db3f85e0731549d364f3ac417df8317973b7eabe025b6a28d
                                                              • Opcode Fuzzy Hash: 078e592c1d39f33d3a33c40349e42acb8d106e1fd534ab1a2253029eef1bbc4d
                                                              • Instruction Fuzzy Hash: BC11E2B2A01614EBDF20DB98D948B9D77B8BBC7754F150235E901E7290D3B8ED05CBA0
                                                              APIs
                                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 007B4DF5
                                                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 007B4E1E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Internet$OpenOption
                                                              • String ID: <local>
                                                              • API String ID: 942729171-4266983199
                                                              • Opcode ID: 93154cb631d125764d092f04ce9b8731babd1b368d7b7efae3f56eed9da25d0b
                                                              • Instruction ID: a33724b065fa01a79841f6f4174c0dcbadd69f8a0e3fe7c67ee87617f2207e36
                                                              • Opcode Fuzzy Hash: 93154cb631d125764d092f04ce9b8731babd1b368d7b7efae3f56eed9da25d0b
                                                              • Instruction Fuzzy Hash: 93117C70601221BBDB258F65C8C9FFBFAA8FF16755F10822AF61596141D3789980C6E0
                                                              APIs
                                                              • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 007BA84E
                                                              • htons.WSOCK32(00000000,?,00000000), ref: 007BA88B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: htonsinet_addr
                                                              • String ID: 255.255.255.255
                                                              • API String ID: 3832099526-2422070025
                                                              • Opcode ID: b1f662c6063fe28988468899a3e2660b7ec3ce3bf70cdd21891abd40d8d06fde
                                                              • Instruction ID: 0642fc49a55ff227129c8cfb9f1482cd54f5d69859371f749d272eda839e26c7
                                                              • Opcode Fuzzy Hash: b1f662c6063fe28988468899a3e2660b7ec3ce3bf70cdd21891abd40d8d06fde
                                                              • Instruction Fuzzy Hash: B601D275200304BBCB22AF68D88AFEDB368EF45310F10852AF9169B6D1D779E8058756
                                                              APIs
                                                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 0079B7EF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 3850602802-1403004172
                                                              • Opcode ID: 56f4c809e0f4078e8c951252cf1e94f22f7777c64b2ce7b7f22b21ce9ed8eb81
                                                              • Instruction ID: b0fc9a3a0f029a9e82dcdd0f0303bd430b4347c3d450cc0d8603d931cf168628
                                                              • Opcode Fuzzy Hash: 56f4c809e0f4078e8c951252cf1e94f22f7777c64b2ce7b7f22b21ce9ed8eb81
                                                              • Instruction Fuzzy Hash: 1101B1B1641124EBCF05EBA4EC56DFE33B9BF49350B04061DF8A2A72D2EB7D59188790
                                                              APIs
                                                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 0079B6EB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 3850602802-1403004172
                                                              • Opcode ID: 7994f34a8c655aa6e602b94ff6e249ec15ca637a4dcec4809617513ca6518efb
                                                              • Instruction ID: 6a48e1057190ff42b22677d95c8a0e286807f2053ade1e1a4157627a8c67e343
                                                              • Opcode Fuzzy Hash: 7994f34a8c655aa6e602b94ff6e249ec15ca637a4dcec4809617513ca6518efb
                                                              • Instruction Fuzzy Hash: 7501A2B1641008EBCF15EBA4EA57AFE73BC9F05340F100019B842B3281DB9D6E2887B5
                                                              APIs
                                                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 0079B76C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 3850602802-1403004172
                                                              • Opcode ID: 4925a850877d083022cb4bd9b9cfdf420be832a1ee260a6b98f52375669f6469
                                                              • Instruction ID: eb6b840e4f705e369ff18c04ca8645f4586c08ec61712d936eec37845b215e69
                                                              • Opcode Fuzzy Hash: 4925a850877d083022cb4bd9b9cfdf420be832a1ee260a6b98f52375669f6469
                                                              • Instruction Fuzzy Hash: 6F01D1B1641104EBCF12EBA4EA46EFE73AC9F05340F10011AB846B3292DB6D5E1987B5
                                                              APIs
                                                              • LoadImageW.USER32(00760000,00000063,00000001,00000010,00000010,00000000), ref: 00764048
                                                              • EnumResourceNamesW.KERNEL32(00000000,0000000E,007A67E9,00000063,00000000,75A90280,?,?,00763EE1,?,?,000000FF), ref: 007D41B3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: EnumImageLoadNamesResource
                                                              • String ID: >v
                                                              • API String ID: 1578290342-479353832
                                                              • Opcode ID: 094cead118adf29218dc114eb087587f44a19954a674a0659820cf12fcf4bf43
                                                              • Instruction ID: 4383c4985c8c4b66edc8da1c2ab62ab3cf4f587262680955908906d39eecf741
                                                              • Opcode Fuzzy Hash: 094cead118adf29218dc114eb087587f44a19954a674a0659820cf12fcf4bf43
                                                              • Instruction Fuzzy Hash: 9BF0CD71250364B7EA304B1AAC4AF823AA8B728BB0F208116F610AA1D0D2F484918A94
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: ClassName_wcscmp
                                                              • String ID: #32770
                                                              • API String ID: 2292705959-463685578
                                                              • Opcode ID: b3042fb3247f9b2132a8bf387c50e1609d20e8f5d2a94d3c523aee8dde43d99d
                                                              • Instruction ID: 7cd5f259b7626ceadc889d68d8c64bb38d123f7dbdcf5ea539af087e0b692403
                                                              • Opcode Fuzzy Hash: b3042fb3247f9b2132a8bf387c50e1609d20e8f5d2a94d3c523aee8dde43d99d
                                                              • Instruction Fuzzy Hash: 54E022336003242BDB20EAE5AC09E87FBACEB91760F004016B914D3141E678AA4187D0
                                                              APIs
                                                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 0079A63F
                                                                • Part of subcall function 007813F1: _doexit.LIBCMT ref: 007813FB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: Message_doexit
                                                              • String ID: AutoIt$Error allocating memory.
                                                              • API String ID: 1993061046-4017498283
                                                              • Opcode ID: 103a53f9d040826280564bc50d860113cc2a739217c4e6cc6edd48685cae3042
                                                              • Instruction ID: 5cb9934f99adcea94cc6dafe57bab56569b02ca055615fb059ee4fd6898d433a
                                                              • Opcode Fuzzy Hash: 103a53f9d040826280564bc50d860113cc2a739217c4e6cc6edd48685cae3042
                                                              • Instruction Fuzzy Hash: E2D02B313C131873C62036A87C0FFC4364C8F08B91F044011FF0CD96C249DE8A9002D9
                                                              APIs
                                                              • GetSystemDirectoryW.KERNEL32(?), ref: 007DACC0
                                                              • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 007DAEBD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: DirectoryFreeLibrarySystem
                                                              • String ID: WIN_XPe
                                                              • API String ID: 510247158-3257408948
                                                              • Opcode ID: 04e4bf14ae99bca7070533363a73b8475847d25f2a4306f17c982b2c0208f56b
                                                              • Instruction ID: c7d7be58fa036a1efe6c51c878b2a7382f2c81edf23660da1da522424febfbd1
                                                              • Opcode Fuzzy Hash: 04e4bf14ae99bca7070533363a73b8475847d25f2a4306f17c982b2c0208f56b
                                                              • Instruction Fuzzy Hash: D4E06DB0C10149EFCF21DBA4D984AECB7B8BB48301F14D082E146B6260CB385E84DF36
                                                              APIs
                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007C86E2
                                                              • PostMessageW.USER32(00000000), ref: 007C86E9
                                                                • Part of subcall function 007A7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 007A7AD0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: FindMessagePostSleepWindow
                                                              • String ID: Shell_TrayWnd
                                                              • API String ID: 529655941-2988720461
                                                              • Opcode ID: 7de3f571846a77a3a7ee5221fdecaa71c9f8fd7683e73b3d189c79f4a5eae49e
                                                              • Instruction ID: 135ec6694aec186f64718843a9517c3588375d772640aedb542ad8e55dfdd789
                                                              • Opcode Fuzzy Hash: 7de3f571846a77a3a7ee5221fdecaa71c9f8fd7683e73b3d189c79f4a5eae49e
                                                              • Instruction Fuzzy Hash: 68D0A931382354BBE23863309C4BFC66A08AB08B10F004814B205EE1C0C8A8AD40C628
                                                              APIs
                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007C86A2
                                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 007C86B5
                                                                • Part of subcall function 007A7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 007A7AD0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2102053386.0000000000761000.00000020.00000001.01000000.00000003.sdmp, Offset: 00760000, based on PE: true
                                                              • Associated: 00000000.00000002.2102039912.0000000000760000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.00000000007ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102106470.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102149202.000000000081A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2102166761.0000000000824000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_760000_SOA SEP 2024.jbxd
                                                              Similarity
                                                              • API ID: FindMessagePostSleepWindow
                                                              • String ID: Shell_TrayWnd
                                                              • API String ID: 529655941-2988720461
                                                              • Opcode ID: be8d1b0d2fec704c3fc633b307abd2dc1abfaf8718ab1408f8c63dd0f8322401
                                                              • Instruction ID: d2911b021c4dc7cb2eec2bb62eb715337e8986a5e9d6a4127b9fed2454585b42
                                                              • Opcode Fuzzy Hash: be8d1b0d2fec704c3fc633b307abd2dc1abfaf8718ab1408f8c63dd0f8322401
                                                              • Instruction Fuzzy Hash: 48D0C931385354B7E67867709C4BFC66A18AB48B11F114915B649AE1D0C9A8AD50C668