Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tems.exe

Overview

General Information

Sample name:tems.exe
Analysis ID:1428831
MD5:6b3fa7db5c683ef540f54032a6e66969
SHA1:7f67b47a196163d7c4a5827c944fb8b45e30aef0
SHA256:71aebecb72a2f1da69501437a4f77de95eac842a4439df68e66bf2a792c0d5d6
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • tems.exe (PID: 7320 cmdline: "C:\Users\user\Desktop\tems.exe" MD5: 6B3FA7DB5C683EF540F54032A6E66969)
    • RegSvcs.exe (PID: 7336 cmdline: "C:\Users\user\Desktop\tems.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • newfile.exe (PID: 7508 cmdline: "C:\Users\user\AppData\Roaming\newfile\newfile.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 7524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • newfile.exe (PID: 7860 cmdline: "C:\Users\user\AppData\Roaming\newfile\newfile.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 7868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "mail.cash4cars.nz", "Username": "logs@cash4cars.nz", "Password": "logs2024!"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.2937483921.00000000028C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.2937483921.00000000028C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  1.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x34662:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x346d4:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x3475e:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x347f0:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x3485a:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x348cc:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x34962:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x349f2:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.tems.exe.1690000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 6 entries

                    System Summary

                    barindex
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\newfile\newfile.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 7336, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\newfile
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.tems.exe.1690000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.cash4cars.nz", "Username": "logs@cash4cars.nz", "Password": "logs2024!"}
                    Source: tems.exeReversingLabs: Detection: 44%
                    Source: tems.exeJoe Sandbox ML: detected
                    Source: tems.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: Binary string: RegSvcs.pdb, source: newfile.exe, 00000002.00000000.1818277065.0000000000252000.00000002.00000001.01000000.00000006.sdmp, newfile.exe.1.dr
                    Source: Binary string: wntdll.pdbUGP source: tems.exe, 00000000.00000003.1687911775.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, tems.exe, 00000000.00000003.1688402448.00000000040E0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: tems.exe, 00000000.00000003.1687911775.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, tems.exe, 00000000.00000003.1688402448.00000000040E0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: RegSvcs.pdb source: newfile.exe, 00000002.00000000.1818277065.0000000000252000.00000002.00000001.01000000.00000006.sdmp, newfile.exe.1.dr
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D64696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00D64696
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00D6C9C7
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6C93C FindFirstFileW,FindClose,0_2_00D6C93C
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D6F200
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D6F35D
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00D6F65E
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D63A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D63A2B
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D63D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D63D4E
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00D6BF27

                    Networking

                    barindex
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.tems.exe.1690000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 114.142.162.17:26
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: Joe Sandbox ViewIP Address: 114.142.162.17 114.142.162.17
                    Source: Joe Sandbox ViewASN Name: SERVERMULE-AS-APNimbus2PtyLtdAU SERVERMULE-AS-APNimbus2PtyLtdAU
                    Source: unknownDNS query: name: ip-api.com
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D725E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00D725E2
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: ip-api.com
                    Source: RegSvcs.exe, 00000001.00000002.2937483921.0000000002891000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                    Source: tems.exe, 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2937483921.0000000002891000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: RegSvcs.exe, 00000001.00000002.2936705010.0000000000C6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostinggv
                    Source: RegSvcs.exe, 00000001.00000002.2937483921.00000000028F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.cash4cars.nz
                    Source: RegSvcs.exe, 00000001.00000002.2937483921.0000000002891000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: tems.exe, 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.tems.exe.1690000.1.raw.unpack, cPKWk.cs.Net Code: hZd2
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D7425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00D7425A
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D74458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00D74458
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D7425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00D7425A
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D60219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00D60219
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D8CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00D8CDAC

                    System Summary

                    barindex
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.tems.exe.1690000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.tems.exe.1690000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\tems.exeCode function: This is a third-party compiled AutoIt script.0_2_00D03B4C
                    Source: tems.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: tems.exe, 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_16a35bf3-9
                    Source: tems.exe, 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0e4cfcc4-0
                    Source: tems.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8a820989-c
                    Source: tems.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_f484a925-e
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D640B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00D640B1
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D58858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00D58858
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00D6545F
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D0E8000_2_00D0E800
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D2DBB50_2_00D2DBB5
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D8804A0_2_00D8804A
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D0E0600_2_00D0E060
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D141400_2_00D14140
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D224050_2_00D22405
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D365220_2_00D36522
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D3267E0_2_00D3267E
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D806650_2_00D80665
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D168430_2_00D16843
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D2283A0_2_00D2283A
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D389DF0_2_00D389DF
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D80AE20_2_00D80AE2
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D36A940_2_00D36A94
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D18A0E0_2_00D18A0E
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D68B130_2_00D68B13
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D5EB070_2_00D5EB07
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D2CD610_2_00D2CD61
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D370060_2_00D37006
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D131900_2_00D13190
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D1710E0_2_00D1710E
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D012870_2_00D01287
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D233C70_2_00D233C7
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D2F4190_2_00D2F419
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D216C40_2_00D216C4
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D156800_2_00D15680
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D278D30_2_00D278D3
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D158C00_2_00D158C0
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D21BB80_2_00D21BB8
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D39D050_2_00D39D05
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D0FE400_2_00D0FE40
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D21FD00_2_00D21FD0
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D2BFE60_2_00D2BFE6
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_016836900_2_01683690
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00DF4AD01_2_00DF4AD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00DFD2301_2_00DFD230
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00DF3EB81_2_00DF3EB8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00DF42001_2_00DF4200
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_061787881_2_06178788
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_061732D01_2_061732D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0617B3801_2_0617B380
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_061700401_2_06170040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06179BF01_2_06179BF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0617E8301_2_0617E830
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_061759101_2_06175910
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_061700061_2_06170006
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06178EF01_2_06178EF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0617ACA01_2_0617ACA0
                    Source: C:\Users\user\Desktop\tems.exeCode function: String function: 00D07F41 appears 35 times
                    Source: C:\Users\user\Desktop\tems.exeCode function: String function: 00D28B40 appears 42 times
                    Source: C:\Users\user\Desktop\tems.exeCode function: String function: 00D20D27 appears 70 times
                    Source: tems.exe, 00000000.00000003.1688030121.000000000420D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs tems.exe
                    Source: tems.exe, 00000000.00000003.1687911775.0000000004063000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs tems.exe
                    Source: tems.exe, 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename5c6f5efb-7c76-4283-af3e-eb17be5e53b7.exe4 vs tems.exe
                    Source: tems.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.tems.exe.1690000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.tems.exe.1690000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.tems.exe.1690000.1.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.tems.exe.1690000.1.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.tems.exe.1690000.1.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.tems.exe.1690000.1.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.tems.exe.1690000.1.raw.unpack, 6oQOw74dfIt.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.tems.exe.1690000.1.raw.unpack, aMIWm.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.tems.exe.1690000.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.tems.exe.1690000.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/8@2/2
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6A2D5 GetLastError,FormatMessageW,0_2_00D6A2D5
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D58713 AdjustTokenPrivileges,CloseHandle,0_2_00D58713
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D58CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00D58CC3
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00D6B59E
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D7F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00D7F121
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D786D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00D786D0
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D04FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00D04FE9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\newfileJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7868:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7524:120:WilError_03
                    Source: C:\Users\user\Desktop\tems.exeFile created: C:\Users\user\AppData\Local\Temp\autA2F3.tmpJump to behavior
                    Source: tems.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: tems.exeReversingLabs: Detection: 44%
                    Source: unknownProcess created: C:\Users\user\Desktop\tems.exe "C:\Users\user\Desktop\tems.exe"
                    Source: C:\Users\user\Desktop\tems.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\tems.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\newfile\newfile.exe "C:\Users\user\AppData\Roaming\newfile\newfile.exe"
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\newfile\newfile.exe "C:\Users\user\AppData\Roaming\newfile\newfile.exe"
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\tems.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\tems.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\tems.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: tems.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: tems.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: tems.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: tems.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: tems.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: tems.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: tems.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: RegSvcs.pdb, source: newfile.exe, 00000002.00000000.1818277065.0000000000252000.00000002.00000001.01000000.00000006.sdmp, newfile.exe.1.dr
                    Source: Binary string: wntdll.pdbUGP source: tems.exe, 00000000.00000003.1687911775.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, tems.exe, 00000000.00000003.1688402448.00000000040E0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: tems.exe, 00000000.00000003.1687911775.0000000003F40000.00000004.00001000.00020000.00000000.sdmp, tems.exe, 00000000.00000003.1688402448.00000000040E0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: RegSvcs.pdb source: newfile.exe, 00000002.00000000.1818277065.0000000000252000.00000002.00000001.01000000.00000006.sdmp, newfile.exe.1.dr
                    Source: tems.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: tems.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: tems.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: tems.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: tems.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D7C304 LoadLibraryA,GetProcAddress,0_2_00D7C304
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D68719 push FFFFFF8Bh; iretd 0_2_00D6871B
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D2E94F push edi; ret 0_2_00D2E951
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D2EA68 push esi; ret 0_2_00D2EA6A
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D28B85 push ecx; ret 0_2_00D28B98
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D2EC43 push esi; ret 0_2_00D2EC45
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D2ED2C push edi; ret 0_2_00D2ED2E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00DFE67C pushad ; retf 1_2_00DFE67D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00DFE7E7 pushad ; retf 1_2_00DFE7E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00DFE79B pushad ; retf 1_2_00DFE79C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00DFE87F pushad ; retf 1_2_00DFE880
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00DFE833 pushad ; retf 1_2_00DFE834
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00DFE93D pushad ; retf 1_2_00DFE93E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\newfile\newfile.exeJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run newfileJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run newfileJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\newfile\newfile.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D04A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00D04A35
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D855FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00D855FD
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D233C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00D233C7
                    Source: C:\Users\user\Desktop\tems.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: tems.exe PID: 7320, type: MEMORYSTR
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: tems.exe, 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMemory allocated: 7B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMemory allocated: 24E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMemory allocated: AB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMemory allocated: 1190000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMemory allocated: 2BA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMemory allocated: 29C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7589Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2262Jump to behavior
                    Source: C:\Users\user\Desktop\tems.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-99005
                    Source: C:\Users\user\Desktop\tems.exeAPI coverage: 4.8 %
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exe TID: 7580Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exe TID: 7916Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D64696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00D64696
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00D6C9C7
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6C93C FindFirstFileW,FindClose,0_2_00D6C93C
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D6F200
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D6F35D
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00D6F65E
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D63A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D63A2B
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D63D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D63D4E
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D6BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00D6BF27
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D04AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D04AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99219Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98641Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98531Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97719Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97391Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97171Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97062Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96719Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96605Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96499Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96388Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96280Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96172Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95594Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95250Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95141Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94922Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94810Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94702Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94594Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94469Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: RegSvcs.exe, 00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: vmware
                    Source: RegSvcs.exe, 00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                    Source: RegSvcs.exe, 00000001.00000002.2939905808.0000000005BE9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\tems.exeAPI call chain: ExitProcess graph end nodegraph_0-98390
                    Source: C:\Users\user\Desktop\tems.exeAPI call chain: ExitProcess graph end nodegraph_0-98819

                    Anti Debugging

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00DF70B8 CheckRemoteDebuggerPresent,1_2_00DF70B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D741FD BlockInput,0_2_00D741FD
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D03B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00D03B4C
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D35CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00D35CCC
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D7C304 LoadLibraryA,GetProcAddress,0_2_00D7C304
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_01683520 mov eax, dword ptr fs:[00000030h]0_2_01683520
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_01683580 mov eax, dword ptr fs:[00000030h]0_2_01683580
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_01681ED0 mov eax, dword ptr fs:[00000030h]0_2_01681ED0
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D581F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00D581F7
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D2A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D2A395
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D2A364 SetUnhandledExceptionFilter,0_2_00D2A364
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\tems.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 662008Jump to behavior
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D58C93 LogonUserW,0_2_00D58C93
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D03B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00D03B4C
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D04A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00D04A35
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D64EC9 mouse_event,0_2_00D64EC9
                    Source: C:\Users\user\Desktop\tems.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\tems.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D581F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00D581F7
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D64C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00D64C03
                    Source: tems.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: tems.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D2886B cpuid 0_2_00D2886B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Users\user\AppData\Roaming\newfile\newfile.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Users\user\AppData\Roaming\newfile\newfile.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D350D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00D350D7
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D42230 GetUserNameW,0_2_00D42230
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D3418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00D3418A
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D04AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D04AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.tems.exe.1690000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.tems.exe.1690000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2937483921.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2937483921.00000000028EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: tems.exe PID: 7320, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: tems.exeBinary or memory string: WIN_81
                    Source: tems.exeBinary or memory string: WIN_XP
                    Source: tems.exeBinary or memory string: WIN_XPe
                    Source: tems.exeBinary or memory string: WIN_VISTA
                    Source: tems.exeBinary or memory string: WIN_7
                    Source: tems.exeBinary or memory string: WIN_8
                    Source: tems.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.tems.exe.1690000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.tems.exe.1690000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2937483921.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: tems.exe PID: 7320, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.tems.exe.1690000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.tems.exe.1690000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2937483921.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2937483921.00000000028EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: tems.exe PID: 7320, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D76596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00D76596
                    Source: C:\Users\user\Desktop\tems.exeCode function: 0_2_00D76A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00D76A5A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    121
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt1
                    Registry Run Keys / Startup Folder
                    2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS38
                    System Information Discovery
                    Distributed Component Object Model121
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    1
                    Masquerading
                    LSA Secrets451
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    2
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                    Registry Run Keys / Startup Folder
                    2
                    Valid Accounts
                    Cached Domain Credentials151
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                    Virtualization/Sandbox Evasion
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                    Access Token Manipulation
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                    Process Injection
                    /etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                    Hidden Files and Directories
                    Network Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1428831 Sample: tems.exe Startdate: 19/04/2024 Architecture: WINDOWS Score: 100 25 mail.cash4cars.nz 2->25 27 ip-api.com 2->27 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 7 other signatures 2->47 7 tems.exe 4 2->7         started        10 newfile.exe 2 2->10         started        12 newfile.exe 1 2->12         started        signatures3 process4 signatures5 49 Binary is likely a compiled AutoIt script file 7->49 51 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->51 53 Writes to foreign memory regions 7->53 55 Maps a DLL or memory area into another process 7->55 14 RegSvcs.exe 16 4 7->14         started        19 conhost.exe 10->19         started        21 conhost.exe 12->21         started        process6 dnsIp7 29 mail.cash4cars.nz 114.142.162.17, 26 SERVERMULE-AS-APNimbus2PtyLtdAU Australia 14->29 31 ip-api.com 208.95.112.1, 49730, 80 TUT-ASUS United States 14->31 23 C:\Users\user\AppData\Roaming\...\newfile.exe, PE32 14->23 dropped 33 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->33 35 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->35 37 Tries to steal Mail credentials (via file / registry access) 14->37 39 4 other signatures 14->39 file8 signatures9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    tems.exe45%ReversingLabsWin32.Spyware.Negasteal
                    tems.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\newfile\newfile.exe0%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.cash4cars.nz
                    114.142.162.17
                    truetrue
                      unknown
                      ip-api.com
                      208.95.112.1
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://ip-api.com/line/?fields=hostingfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://mail.cash4cars.nzRegSvcs.exe, 00000001.00000002.2937483921.00000000028F4000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            http://ip-api.com/line/?fields=hostinggvRegSvcs.exe, 00000001.00000002.2936705010.0000000000C6E000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://account.dyn.com/tems.exe, 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.2937483921.0000000002891000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://ip-api.comRegSvcs.exe, 00000001.00000002.2937483921.0000000002891000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    208.95.112.1
                                    ip-api.comUnited States
                                    53334TUT-ASUSfalse
                                    114.142.162.17
                                    mail.cash4cars.nzAustralia
                                    133525SERVERMULE-AS-APNimbus2PtyLtdAUtrue
                                    Joe Sandbox version:40.0.0 Tourmaline
                                    Analysis ID:1428831
                                    Start date and time:2024-04-19 17:21:07 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 6m 44s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:11
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:tems.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@7/8@2/2
                                    EGA Information:
                                    • Successful, ratio: 50%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 58
                                    • Number of non-executed functions: 271
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target newfile.exe, PID 7508 because it is empty
                                    • Execution Graph export aborted for target newfile.exe, PID 7860 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • VT rate limit hit for: tems.exe
                                    TimeTypeDescription
                                    16:22:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run newfile C:\Users\user\AppData\Roaming\newfile\newfile.exe
                                    16:22:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run newfile C:\Users\user\AppData\Roaming\newfile\newfile.exe
                                    17:22:02API Interceptor180x Sleep call for process: RegSvcs.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    208.95.112.1PO-095325.scr.exeGet hashmaliciousAgentTeslaBrowse
                                    • ip-api.com/line/?fields=hosting
                                    UPDATED SSTATEMENT OF ACCOUNT.exeGet hashmaliciousAgentTeslaBrowse
                                    • ip-api.com/line/?fields=hosting
                                    Copy of Poseidon Marine 4th monthly Stores Apr 2024 R3 .xls.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • ip-api.com/line/?fields=hosting
                                    REMITTANCE COPY.exeGet hashmaliciousAgentTeslaBrowse
                                    • ip-api.com/line/?fields=hosting
                                    New Voicemail_Daiichi-Sankyo.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • ip-api.com/json/?fields=status,country,regionName,city,query
                                    DHL.exeGet hashmaliciousAgentTeslaBrowse
                                    • ip-api.com/line/?fields=hosting
                                    KjCBSM7Ukv.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                    • ip-api.com/line/?fields=hosting
                                    eO2bqORIJb.exeGet hashmaliciousAgentTeslaBrowse
                                    • ip-api.com/line/?fields=hosting
                                    SecuriteInfo.com.Win64.Evo-gen.10533.31255.exeGet hashmaliciousUnknownBrowse
                                    • ip-api.com/json
                                    13w4NM6mPa.exeGet hashmaliciousLummaCBrowse
                                    • ip-api.com/json
                                    114.142.162.17http://otahuhumainstreet.co.nzGet hashmaliciousUnknownBrowse
                                    • otahuhumainstreet.co.nz/
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ip-api.comPO-095325.scr.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    UPDATED SSTATEMENT OF ACCOUNT.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    Copy of Poseidon Marine 4th monthly Stores Apr 2024 R3 .xls.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 208.95.112.1
                                    REMITTANCE COPY.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    New Voicemail_Daiichi-Sankyo.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 208.95.112.1
                                    DHL.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    KjCBSM7Ukv.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                    • 208.95.112.1
                                    eO2bqORIJb.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    SecuriteInfo.com.Win64.Evo-gen.10533.31255.exeGet hashmaliciousUnknownBrowse
                                    • 208.95.112.1
                                    13w4NM6mPa.exeGet hashmaliciousLummaCBrowse
                                    • 208.95.112.1
                                    mail.cash4cars.nz20220829_PEDIDO_22073M_PROTECO_LIMPIEZA_Y_KITS.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    justificante.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    Transferencia 4334300002017359pdf.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    20220830_ProtecoPTE.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    Klkket.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    PEDIDO MILWAUKEE 00652024.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    Psychologizing.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    RFQ122.494001.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    FACTURA2402616 - BP.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    20220829_PEDIDO_22073M_PROTECO.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                    • 114.142.162.17
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    SERVERMULE-AS-APNimbus2PtyLtdAU20220829_PEDIDO_22073M_PROTECO_LIMPIEZA_Y_KITS.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    justificante.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    Transferencia 4334300002017359pdf.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    20220830_ProtecoPTE.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    Klkket.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    PEDIDO MILWAUKEE 00652024.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    Psychologizing.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    RFQ122.494001.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    FACTURA2402616 - BP.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 114.142.162.17
                                    https://loia.co.nz/news/Get hashmaliciousUnknownBrowse
                                    • 114.142.162.113
                                    TUT-ASUSPO-095325.scr.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    UPDATED SSTATEMENT OF ACCOUNT.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    Copy of Poseidon Marine 4th monthly Stores Apr 2024 R3 .xls.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 208.95.112.1
                                    REMITTANCE COPY.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    New Voicemail_Daiichi-Sankyo.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 208.95.112.1
                                    DHL.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    KjCBSM7Ukv.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                    • 208.95.112.1
                                    eO2bqORIJb.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    SecuriteInfo.com.Win64.Evo-gen.10533.31255.exeGet hashmaliciousUnknownBrowse
                                    • 208.95.112.1
                                    13w4NM6mPa.exeGet hashmaliciousLummaCBrowse
                                    • 208.95.112.1
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\Users\user\AppData\Roaming\newfile\newfile.exeHBL.exeGet hashmaliciousAgentTeslaBrowse
                                      SecuriteInfo.com.Heur.15333.25205.exeGet hashmaliciousAgentTeslaBrowse
                                        SecuriteInfo.com.FileRepMalware.7644.21541.exeGet hashmaliciousAgentTeslaBrowse
                                          Cintillo 2024.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            SHIPMENT ADVICE FOR CLEARTEX.exeGet hashmaliciousAgentTeslaBrowse
                                              REQUEST FOR QUOTATION.exeGet hashmaliciousUnknownBrowse
                                                67002314579XX.exeGet hashmaliciousAgentTeslaBrowse
                                                  Quotation 22001625_REV001.exeGet hashmaliciousAgentTeslaBrowse
                                                    justificante - 2024-04-16T133815.900.exeGet hashmaliciousAgentTeslaBrowse
                                                      OSET BESAFETY Mekatronik _ Siparis 0058114343.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                        Process:C:\Users\user\AppData\Roaming\newfile\newfile.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:modified
                                                        Size (bytes):142
                                                        Entropy (8bit):5.090621108356562
                                                        Encrypted:false
                                                        SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                        MD5:8C0458BB9EA02D50565175E38D577E35
                                                        SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                        SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                        SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                        Process:C:\Users\user\Desktop\tems.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):153546
                                                        Entropy (8bit):7.927153672917626
                                                        Encrypted:false
                                                        SSDEEP:3072:cvPt+A7aT+kBDk8Xo0E2bIsa8W4Gsv6gyVQmhIT4ctWe+G:QPt+3bxks1W4Jijd+4GOG
                                                        MD5:88FE48C756019AA2A1F211EBAE64656F
                                                        SHA1:F3F7F6E7C96BF6A823D99DF8A4F9BE3BF14F6A89
                                                        SHA-256:172318AA06571436C1B8D370D6431723BBA9A1DDE073976CA2B17A50C367A958
                                                        SHA-512:BA5C80D1F70990F5C8AA304A55411B78976060643DFA4867BA8B86DB11F58BE6DBBA608ECA88977447C26ACDFAE9A21B39401D248E11ECF5CD3A4FC34BC53272
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:EA06......8.)..I..i..W..R...z|.T.L..J...U.P.T..\..~....\..'./.....Lc?[..O[.......AQ..%R....!.Hf....so....k...$.We1...v.T../0.A).).F.J..4.eT.Lg4...s...g...\K0uz..$..vi.....O......R..'...F..j.R..+.t.+....*.....L&U...J.4...R.0..W.@.Bf...<.[....D~.._Fi.....kQ.."..U...*.......sL.....d.U.T.c.:..9$.Oj ...n.........?|.....=....J..+... .C.L.../4.\......4:...T...J.aH........S...p....[..lrX.$:;E..%.\].SU....)...8....In.S[.l..O...um..>..0......>...~.....o1.h..L.V.#....$.;]..%..<W....".?.RC..z...e..^.[2....s....fG..jx.n..W&.E..-RM|.T..i.o.V.L@*..........9...kt.$.a..jt....w..h.9....6..'`.ED.H..i..."t..M.9..9...".......*.@..8..S.?....].`t...[f.#^.];?.....-...s!..Pqth......%yH...5..(.......t...y...`..F...N)SJ..V.O.u.'3W.....e.}H..`......o".<..m..N<X.U._....c.R.t./NO.r....\..[..zu5...#mA..6.[l.g-.L....M7..d..$f.d..,r).v\.s...M..h...2.......Z[j.R)..eraU.O!...+2.T/@*..yb.L*1..BcC.U...R.4.X+T...eW.Qm@F..2.T..P...'.R...Z...U&T.;.5x.O.../B.R.I5.j.2.~.F(..M,...#.M....
                                                        Process:C:\Users\user\Desktop\tems.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):9920
                                                        Entropy (8bit):7.594160761497105
                                                        Encrypted:false
                                                        SSDEEP:192:yS5jnkklrTefgLGckXr+msAeRFyF7d8ionhQ0qu+Ur94tD8mhMa6DYfzFNIT:xnI0a+moyF7C1hQPu+Ur6tthyENg
                                                        MD5:2BC667B42F3B1E20425D35D0470EDA01
                                                        SHA1:BFC1757441F6BA64F0EB60C521EA53BEE1E44DF2
                                                        SHA-256:AF636A79B9368285CEE715BC9CCFC5F47671C8C49A07E9B8DB84F6CC7071295D
                                                        SHA-512:D4C142401680F015804A5E9279C7285958CC3041B81B4B4AD8A4C30F1D649DA7FA6B55080D59364618AE3ED8B21E973DC59F115314675B5E18D71756945579B8
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:EA06..t*.P.tY..kD.L'....8.M.t*..o7.Q'.)..aC.P......0.Mf.....8..lv;..e0..&.i...8.X.....m6.Nf.Y...9.M@..d.!,3y.........e.6., ..%..a.X....-.q3...zs0.Nf`.].Y'3+..d....s4.l&..........|....sa...`.........Y&.K0.....-vs5.M..2...N&.I...@.>..........$.0...fx. ..$l...I...#..$6...... ..... .Z...a.5..&.).....L.j.;$....M.j.;$....X@j.;%....Y@j.;,.....j.e.|f #^...j......l.....l.5....>0..Xf....M.^.8.N@.=7.z...#.$...`!..H&.>_L.p..............@|..6..(....ka..&...Xf@0........|.=..g...........`.A..b.......P.O.id...|.)....4....\.M.4.;...K..4|. F...e.f..s....id..p.....4....s`./.....X. ..%..K.;-.o8...k ..4..`w..qd..f`....l.....V0...lS..m4.Y.......>.5...S...f&.+..Af....<..f....gl`....g.d..#4.x..#1.X...cV....0..BV0.NL@.;1.X..e1.Y,S[(.#6.,.d.....f.I......B3p....;2.X.se.Y..@.Fn.....f`...J&.9.......!93.X...c6).$.6.....h`...@.....3f.Lg3I..h....l.Z.,.....[%.ec...`....,vj...%.sb.X.,...p.....f.....g ...!8.....c.`!......3d...l.2.,...g.K..i0...B.....@.....j.0..B...Fl.....f....X.I..P...@
                                                        Process:C:\Users\user\Desktop\tems.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):244736
                                                        Entropy (8bit):6.654557029361414
                                                        Encrypted:false
                                                        SSDEEP:6144:P84+DRNlHf0ddf26LFP5Kll0pP8nS+SmAnZit8JeABBvlMP+26Upf26tSjrmI3UN:k4+DRNlHf0ddf26LZ5Kll0pPx+SmR8Js
                                                        MD5:D6CDD45592CA5BD6156F9F3B2ABDC4E1
                                                        SHA1:2F37020E2B80E96B74573CF6F182EB3CDB558BC9
                                                        SHA-256:29B4460D3067C151E4A069C3A1A5DB9D93315B12EABD32977E6725485E912094
                                                        SHA-512:44E861A2CDB1CA00A5E683BA61BC0B6C90D75EC6B27A36C65528B578168553BE153ACBE880A367AA8C09ABDC0439BE2FE0B9FD85EEF7D124621032DAAF50204A
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:...R32HIE9L0..CR.2VWO2RT.02HIA9L0U8CRO2VWO2RTR02HIA9L0U8CRO2.WO2\K.>2.@...1..b.'[%w?@=3 Q_h* W"_!.!7o@#9o[<t..ah$.]).X5IvO2VWO2R..02.HB9.JJ^CRO2VWO2.TP19IBA9.3U8KRO2VWO,.WR0.HIA.O0U8.RO.VWO0RTV02HIA9L4U8CRO2VWo6RTP02HIA9N0..CR_2VGO2RTB02XIA9L0U(CRO2VWO2RTR..KI.9L0U.@R.7VWO2RTR02HIA9L0U8CRO6V[O2RTR02HIA9L0U8CRO2VWO2RTR02HIA9L0U8CRO2VWO2RTR02HIA.L0]8CRO2VWO2RTZ.2H.A9L0U8CRO2Vy;W* R02l.B9L.U8C.L2VUO2RTR02HIA9L0U.CR/.$$=QRTRv7HIA.O0U>CRO.UWO2RTR02HIA9LpU8.|=W:8,2RXR02HIE9L2U8C.L2VWO2RTR02HIAyL0.8CRO2VWO2RTR02HIA.O0U8CR.2VWM2WTZ.0H.w8L3U8CSO2PWO2RTR02HIA9L0U8CRO2VWO2RTR02HIA9L0U8CRO2VWO2RTR-......E}X-5.q.U.W..!..8..?.-.)[....?....o<G..0.7s..._...!.871H......#Y><>.8.]5.-.....mD.s.T!.,..,f.^4l.h..s....~Y#.j..&.+&,.-@%T&|.S06=[.V.12HIA.....[....Q[L. 0...a*;...12RT602H;A9LQU8C.O2V8O2R:R026IA920U8.RO2.WO2eTR0.HIATL0U.CROLVWO./[]... 2..0U8CRz..g._...o....zA.F.0w.+....5a.F).;s....A..<..E.96...F8J4P:DVL>kY...s26LLC>H3Y.M...v...k...8.c/.?RO2VWO.RT.02H..9.0U8.R.2..O2R.0.H.A..U
                                                        Process:C:\Users\user\Desktop\tems.exe
                                                        File Type:ASCII text, with very long lines (29738), with no line terminators
                                                        Category:dropped
                                                        Size (bytes):29738
                                                        Entropy (8bit):3.5491527073872167
                                                        Encrypted:false
                                                        SSDEEP:768:DiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNb2E+Ip6Cr4vfF3if6gy0:DiTZ+2QoioGRk6ZklputwjpjBkCiw2R7
                                                        MD5:24B37AC592EF6B5154C29403224C88DF
                                                        SHA1:B7145FD35933E4DB4C5D642F3795B9B731393797
                                                        SHA-256:5673D15335877EA949A71CCF0CF55BF166520C4458E57A02A8693E41479D8A2D
                                                        SHA-512:1635CE05512EB5B8826D74E8B09000DDCC42AF437553A58260AF231978155CF181C7A9AFA05A4312509103C05B9D84E4CBCDFC1F92A8BC912979AEFCBD609D67
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:8BCE895DD08975C8663BC2772D8B5F0C8BD08BFE0x558bec81eccc0200005657b86b00000066894584b96500000066894d86ba7200000066895588b86e0000006689458ab96500000066894d8cba6c0000006689558eb83300000066894590b93200000066894d92ba2e00000066895594b86400000066894596b96c00000066894d98ba6c0000006689559a33c06689459cb96e00000066898d44ffffffba7400000066899546ffffffb86400000066898548ffffffb96c00000066898d4affffffba6c0000006689954cffffffb82e0000006689854effffffb96400000066898d50ffffffba6c00000066899552ffffffb86c00000066898554ffffff33c966898d56ffffffba75000000668955d0b873000000668945d2b96500000066894dd4ba72000000668955d6b833000000668945d8b93200000066894ddaba2e000000668955dcb864000000668945deb96c00000066894de0ba6c000000668955e233c0668945e4b96100000066898d68ffffffba640000006689956affffffb8760000006689856cffffffb96100000066898d6effffffba7000000066899570ffffffb86900000066898572ffffffb93300000066898d74ffffffba3200000066899576ffffffb82e00000066898578ffffffb96400000066898d7affffffba6c0000006689957cffffffb86c0000006689857e
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):45984
                                                        Entropy (8bit):6.16795797263964
                                                        Encrypted:false
                                                        SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                                        MD5:9D352BC46709F0CB5EC974633A0C3C94
                                                        SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                                        SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                                        SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Joe Sandbox View:
                                                        • Filename: HBL.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Heur.15333.25205.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.FileRepMalware.7644.21541.exe, Detection: malicious, Browse
                                                        • Filename: Cintillo 2024.pdf.exe, Detection: malicious, Browse
                                                        • Filename: SHIPMENT ADVICE FOR CLEARTEX.exe, Detection: malicious, Browse
                                                        • Filename: REQUEST FOR QUOTATION.exe, Detection: malicious, Browse
                                                        • Filename: 67002314579XX.exe, Detection: malicious, Browse
                                                        • Filename: Quotation 22001625_REV001.exe, Detection: malicious, Browse
                                                        • Filename: justificante - 2024-04-16T133815.900.exe, Detection: malicious, Browse
                                                        • Filename: OSET BESAFETY Mekatronik _ Siparis 0058114343.exe, Detection: malicious, Browse
                                                        Reputation:moderate, very likely benign file
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                        Process:C:\Users\user\AppData\Roaming\newfile\newfile.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1141
                                                        Entropy (8bit):4.442398121585593
                                                        Encrypted:false
                                                        SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                                        MD5:6FB4D27A716A8851BC0505666E7C7A10
                                                        SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                                        SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                                        SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.937698830916027
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:tems.exe
                                                        File size:1'038'336 bytes
                                                        MD5:6b3fa7db5c683ef540f54032a6e66969
                                                        SHA1:7f67b47a196163d7c4a5827c944fb8b45e30aef0
                                                        SHA256:71aebecb72a2f1da69501437a4f77de95eac842a4439df68e66bf2a792c0d5d6
                                                        SHA512:cefcd47718bfba0ab57d7c50900704da19ae2433afdfe662269cc8b60f5ca170be737594a21c3f40aaa59b978f3a25c48bd5e8e25e9e21d8f46df386b5a859ee
                                                        SSDEEP:24576:WAHnh+eWsN3skA4RV1Hom2KXMmHaxtIq2mAbVfMA+Xw5:xh+ZkldoPK8Yax6mEfMVG
                                                        TLSH:E8259D0273D1C036FFABA2739B6AF64156BC79254133852F13981DB9BD701B2263E663
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x42800a
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x6621DAFB [Fri Apr 19 02:46:19 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                        Instruction
                                                        call 00007FEB954853EDh
                                                        jmp 00007FEB954781A4h
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        push edi
                                                        push esi
                                                        mov esi, dword ptr [esp+10h]
                                                        mov ecx, dword ptr [esp+14h]
                                                        mov edi, dword ptr [esp+0Ch]
                                                        mov eax, ecx
                                                        mov edx, ecx
                                                        add eax, esi
                                                        cmp edi, esi
                                                        jbe 00007FEB9547832Ah
                                                        cmp edi, eax
                                                        jc 00007FEB9547868Eh
                                                        bt dword ptr [004C41FCh], 01h
                                                        jnc 00007FEB95478329h
                                                        rep movsb
                                                        jmp 00007FEB9547863Ch
                                                        cmp ecx, 00000080h
                                                        jc 00007FEB954784F4h
                                                        mov eax, edi
                                                        xor eax, esi
                                                        test eax, 0000000Fh
                                                        jne 00007FEB95478330h
                                                        bt dword ptr [004BF324h], 01h
                                                        jc 00007FEB95478800h
                                                        bt dword ptr [004C41FCh], 00000000h
                                                        jnc 00007FEB954784CDh
                                                        test edi, 00000003h
                                                        jne 00007FEB954784DEh
                                                        test esi, 00000003h
                                                        jne 00007FEB954784BDh
                                                        bt edi, 02h
                                                        jnc 00007FEB9547832Fh
                                                        mov eax, dword ptr [esi]
                                                        sub ecx, 04h
                                                        lea esi, dword ptr [esi+04h]
                                                        mov dword ptr [edi], eax
                                                        lea edi, dword ptr [edi+04h]
                                                        bt edi, 03h
                                                        jnc 00007FEB95478333h
                                                        movq xmm1, qword ptr [esi]
                                                        sub ecx, 08h
                                                        lea esi, dword ptr [esi+08h]
                                                        movq qword ptr [edi], xmm1
                                                        lea edi, dword ptr [edi+08h]
                                                        test esi, 00000007h
                                                        je 00007FEB95478385h
                                                        bt esi, 03h
                                                        Programming Language:
                                                        • [ASM] VS2013 build 21005
                                                        • [ C ] VS2013 build 21005
                                                        • [C++] VS2013 build 21005
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        • [ASM] VS2013 UPD5 build 40629
                                                        • [RES] VS2013 build 21005
                                                        • [LNK] VS2013 UPD5 build 40629
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x330b8.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xfc0000x7134.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xc80000x330b80x332004bbe564802ae44aeec37f65e401064b9False0.8707499235941321data7.751333462281989IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xfc0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                                                        RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xd07b80x2a350data1.0003528459046738
                                                        RT_GROUP_ICON0xfab080x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0xfab800x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0xfab940x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0xfaba80x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0xfabbc0x10cdataEnglishGreat Britain0.5970149253731343
                                                        RT_MANIFEST0xfacc80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Apr 19, 2024 17:22:01.863162041 CEST4973080192.168.2.4208.95.112.1
                                                        Apr 19, 2024 17:22:01.983607054 CEST8049730208.95.112.1192.168.2.4
                                                        Apr 19, 2024 17:22:01.983716011 CEST4973080192.168.2.4208.95.112.1
                                                        Apr 19, 2024 17:22:01.985014915 CEST4973080192.168.2.4208.95.112.1
                                                        Apr 19, 2024 17:22:02.104882002 CEST8049730208.95.112.1192.168.2.4
                                                        Apr 19, 2024 17:22:02.151773930 CEST4973080192.168.2.4208.95.112.1
                                                        Apr 19, 2024 17:22:03.561860085 CEST4973126192.168.2.4114.142.162.17
                                                        Apr 19, 2024 17:22:04.573684931 CEST4973126192.168.2.4114.142.162.17
                                                        Apr 19, 2024 17:22:06.589307070 CEST4973126192.168.2.4114.142.162.17
                                                        Apr 19, 2024 17:22:10.589226961 CEST4973126192.168.2.4114.142.162.17
                                                        Apr 19, 2024 17:22:18.589155912 CEST4973126192.168.2.4114.142.162.17
                                                        Apr 19, 2024 17:22:53.900022030 CEST4973080192.168.2.4208.95.112.1
                                                        Apr 19, 2024 17:22:54.016299963 CEST8049730208.95.112.1192.168.2.4
                                                        Apr 19, 2024 17:22:54.016402960 CEST4973080192.168.2.4208.95.112.1
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Apr 19, 2024 17:22:01.749284029 CEST5691653192.168.2.41.1.1.1
                                                        Apr 19, 2024 17:22:01.854809046 CEST53569161.1.1.1192.168.2.4
                                                        Apr 19, 2024 17:22:03.061388016 CEST6144853192.168.2.41.1.1.1
                                                        Apr 19, 2024 17:22:03.558651924 CEST53614481.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Apr 19, 2024 17:22:01.749284029 CEST192.168.2.41.1.1.10x9781Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                        Apr 19, 2024 17:22:03.061388016 CEST192.168.2.41.1.1.10x60fStandard query (0)mail.cash4cars.nzA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Apr 19, 2024 17:22:01.854809046 CEST1.1.1.1192.168.2.40x9781No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                        Apr 19, 2024 17:22:03.558651924 CEST1.1.1.1192.168.2.40x60fNo error (0)mail.cash4cars.nz114.142.162.17A (IP address)IN (0x0001)false
                                                        • ip-api.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449730208.95.112.1807336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 19, 2024 17:22:01.985014915 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                        Host: ip-api.com
                                                        Connection: Keep-Alive
                                                        Apr 19, 2024 17:22:02.104882002 CEST174INHTTP/1.1 200 OK
                                                        Date: Fri, 19 Apr 2024 15:22:01 GMT
                                                        Content-Type: text/plain; charset=utf-8
                                                        Content-Length: 5
                                                        Access-Control-Allow-Origin: *
                                                        X-Ttl: 60
                                                        X-Rl: 44
                                                        Data Raw: 74 72 75 65 0a
                                                        Data Ascii: true


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:17:21:59
                                                        Start date:19/04/2024
                                                        Path:C:\Users\user\Desktop\tems.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\tems.exe"
                                                        Imagebase:0xd00000
                                                        File size:1'038'336 bytes
                                                        MD5 hash:6B3FA7DB5C683EF540F54032A6E66969
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1689610512.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:17:22:00
                                                        Start date:19/04/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\tems.exe"
                                                        Imagebase:0x5a0000
                                                        File size:45'984 bytes
                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2936459456.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2937483921.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2937483921.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2937483921.00000000028EC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:2
                                                        Start time:17:22:13
                                                        Start date:19/04/2024
                                                        Path:C:\Users\user\AppData\Roaming\newfile\newfile.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
                                                        Imagebase:0x250000
                                                        File size:45'984 bytes
                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 0%, ReversingLabs
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:3
                                                        Start time:17:22:14
                                                        Start date:19/04/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff7699e0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:17:22:21
                                                        Start date:19/04/2024
                                                        Path:C:\Users\user\AppData\Roaming\newfile\newfile.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
                                                        Imagebase:0x800000
                                                        File size:45'984 bytes
                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:6
                                                        Start time:17:22:21
                                                        Start date:19/04/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff7699e0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:3.9%
                                                          Dynamic/Decrypted Code Coverage:1.5%
                                                          Signature Coverage:6%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:178
                                                          execution_graph 98199 d27e93 98200 d27e9f __alloc_osfhnd 98199->98200 98236 d2a048 GetStartupInfoW 98200->98236 98202 d27ea4 98238 d28dbc GetProcessHeap 98202->98238 98204 d27efc 98207 d27f07 98204->98207 98321 d27fe3 58 API calls 3 library calls 98204->98321 98239 d29d26 98207->98239 98208 d27f0d 98209 d27f18 __RTC_Initialize 98208->98209 98322 d27fe3 58 API calls 3 library calls 98208->98322 98260 d2d812 98209->98260 98212 d27f27 98213 d27f33 GetCommandLineW 98212->98213 98323 d27fe3 58 API calls 3 library calls 98212->98323 98279 d35173 GetEnvironmentStringsW 98213->98279 98217 d27f32 98217->98213 98219 d27f4d 98220 d27f58 98219->98220 98324 d232f5 58 API calls 3 library calls 98219->98324 98289 d34fa8 98220->98289 98223 d27f5e 98224 d27f69 98223->98224 98325 d232f5 58 API calls 3 library calls 98223->98325 98303 d2332f 98224->98303 98227 d27f71 98228 d27f7c __wwincmdln 98227->98228 98326 d232f5 58 API calls 3 library calls 98227->98326 98309 d0492e 98228->98309 98231 d27f90 98232 d27f9f 98231->98232 98327 d23598 58 API calls _doexit 98231->98327 98328 d23320 58 API calls _doexit 98232->98328 98235 d27fa4 __alloc_osfhnd 98237 d2a05e 98236->98237 98237->98202 98238->98204 98329 d233c7 36 API calls 2 library calls 98239->98329 98241 d29d2b 98330 d29f7c InitializeCriticalSectionAndSpinCount __alloc_osfhnd 98241->98330 98243 d29d30 98244 d29d34 98243->98244 98332 d29fca TlsAlloc 98243->98332 98331 d29d9c 61 API calls 2 library calls 98244->98331 98247 d29d39 98247->98208 98248 d29d46 98248->98244 98249 d29d51 98248->98249 98333 d28a15 98249->98333 98252 d29d93 98341 d29d9c 61 API calls 2 library calls 98252->98341 98255 d29d72 98255->98252 98257 d29d78 98255->98257 98256 d29d98 98256->98208 98340 d29c73 58 API calls 4 library calls 98257->98340 98259 d29d80 GetCurrentThreadId 98259->98208 98261 d2d81e __alloc_osfhnd 98260->98261 98353 d29e4b 98261->98353 98263 d2d825 98264 d28a15 __calloc_crt 58 API calls 98263->98264 98265 d2d836 98264->98265 98266 d2d8a1 GetStartupInfoW 98265->98266 98267 d2d841 __alloc_osfhnd @_EH4_CallFilterFunc@8 98265->98267 98268 d2d9e5 98266->98268 98270 d2d8b6 98266->98270 98267->98212 98269 d2daad 98268->98269 98273 d2da32 GetStdHandle 98268->98273 98274 d2da45 GetFileType 98268->98274 98361 d2a06b InitializeCriticalSectionAndSpinCount 98268->98361 98362 d2dabd LeaveCriticalSection _doexit 98269->98362 98270->98268 98272 d28a15 __calloc_crt 58 API calls 98270->98272 98275 d2d904 98270->98275 98272->98270 98273->98268 98274->98268 98275->98268 98276 d2d938 GetFileType 98275->98276 98360 d2a06b InitializeCriticalSectionAndSpinCount 98275->98360 98276->98275 98280 d35184 98279->98280 98281 d27f43 98279->98281 98402 d28a5d 58 API calls 2 library calls 98280->98402 98285 d34d6b GetModuleFileNameW 98281->98285 98283 d351aa _memmove 98284 d351c0 FreeEnvironmentStringsW 98283->98284 98284->98281 98287 d34d9f _wparse_cmdline 98285->98287 98286 d34ddf _wparse_cmdline 98286->98219 98287->98286 98403 d28a5d 58 API calls 2 library calls 98287->98403 98290 d34fc1 __wsetenvp 98289->98290 98291 d34fb9 98289->98291 98292 d28a15 __calloc_crt 58 API calls 98290->98292 98291->98223 98293 d34fea __wsetenvp 98292->98293 98293->98291 98295 d28a15 __calloc_crt 58 API calls 98293->98295 98296 d35041 98293->98296 98297 d35066 98293->98297 98300 d3507d 98293->98300 98404 d34857 58 API calls __vswprintf_l 98293->98404 98294 d22f95 _free 58 API calls 98294->98291 98295->98293 98296->98294 98298 d22f95 _free 58 API calls 98297->98298 98298->98291 98405 d29006 IsProcessorFeaturePresent 98300->98405 98302 d35089 98302->98223 98304 d2333b __IsNonwritableInCurrentImage 98303->98304 98428 d2a711 98304->98428 98306 d23359 __initterm_e 98308 d23378 __cinit __IsNonwritableInCurrentImage 98306->98308 98431 d22f80 98306->98431 98308->98227 98310 d049e7 98309->98310 98311 d04948 98309->98311 98310->98231 98312 d04982 IsThemeActive 98311->98312 98466 d235ac 98312->98466 98316 d049ae 98478 d04a5b SystemParametersInfoW SystemParametersInfoW 98316->98478 98318 d049ba 98479 d03b4c 98318->98479 98320 d049c2 SystemParametersInfoW 98320->98310 98321->98207 98322->98209 98323->98217 98327->98232 98328->98235 98329->98241 98330->98243 98331->98247 98332->98248 98334 d28a1c 98333->98334 98336 d28a57 98334->98336 98338 d28a3a 98334->98338 98342 d35446 98334->98342 98336->98252 98339 d2a026 TlsSetValue 98336->98339 98338->98334 98338->98336 98350 d2a372 Sleep 98338->98350 98339->98255 98340->98259 98341->98256 98343 d35451 98342->98343 98347 d3546c 98342->98347 98344 d3545d 98343->98344 98343->98347 98351 d28d68 58 API calls __getptd_noexit 98344->98351 98346 d3547c RtlAllocateHeap 98346->98347 98348 d35462 98346->98348 98347->98346 98347->98348 98352 d235e1 DecodePointer 98347->98352 98348->98334 98350->98338 98351->98348 98352->98347 98354 d29e6f EnterCriticalSection 98353->98354 98355 d29e5c 98353->98355 98354->98263 98363 d29ed3 98355->98363 98357 d29e62 98357->98354 98387 d232f5 58 API calls 3 library calls 98357->98387 98360->98275 98361->98268 98362->98267 98364 d29edf __alloc_osfhnd 98363->98364 98365 d29f00 98364->98365 98366 d29ee8 98364->98366 98378 d29f21 __alloc_osfhnd 98365->98378 98391 d28a5d 58 API calls 2 library calls 98365->98391 98388 d2a3ab 58 API calls 2 library calls 98366->98388 98369 d29eed 98389 d2a408 58 API calls 8 library calls 98369->98389 98370 d29f15 98372 d29f2b 98370->98372 98373 d29f1c 98370->98373 98376 d29e4b __lock 58 API calls 98372->98376 98392 d28d68 58 API calls __getptd_noexit 98373->98392 98374 d29ef4 98390 d232df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98374->98390 98379 d29f32 98376->98379 98378->98357 98381 d29f57 98379->98381 98382 d29f3f 98379->98382 98394 d22f95 98381->98394 98393 d2a06b InitializeCriticalSectionAndSpinCount 98382->98393 98385 d29f4b 98400 d29f73 LeaveCriticalSection _doexit 98385->98400 98388->98369 98389->98374 98391->98370 98392->98378 98393->98385 98395 d22fc7 _free 98394->98395 98396 d22f9e RtlFreeHeap 98394->98396 98395->98385 98396->98395 98397 d22fb3 98396->98397 98401 d28d68 58 API calls __getptd_noexit 98397->98401 98399 d22fb9 GetLastError 98399->98395 98400->98378 98401->98399 98402->98283 98403->98286 98404->98293 98406 d29011 98405->98406 98411 d28e99 98406->98411 98410 d2902c 98410->98302 98412 d28eb3 _memset ___raise_securityfailure 98411->98412 98413 d28ed3 IsDebuggerPresent 98412->98413 98419 d2a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 98413->98419 98416 d28f97 ___raise_securityfailure 98420 d2c836 98416->98420 98417 d28fba 98418 d2a380 GetCurrentProcess TerminateProcess 98417->98418 98418->98410 98419->98416 98421 d2c840 IsProcessorFeaturePresent 98420->98421 98422 d2c83e 98420->98422 98424 d35b5a 98421->98424 98422->98417 98427 d35b09 5 API calls ___raise_securityfailure 98424->98427 98426 d35c3d 98426->98417 98427->98426 98429 d2a714 EncodePointer 98428->98429 98429->98429 98430 d2a72e 98429->98430 98430->98306 98434 d22e84 98431->98434 98433 d22f8b 98433->98308 98435 d22e90 __alloc_osfhnd 98434->98435 98442 d23457 98435->98442 98441 d22eb7 __alloc_osfhnd 98441->98433 98443 d29e4b __lock 58 API calls 98442->98443 98444 d22e99 98443->98444 98445 d22ec8 DecodePointer DecodePointer 98444->98445 98446 d22ea5 98445->98446 98447 d22ef5 98445->98447 98456 d22ec2 98446->98456 98447->98446 98459 d289e4 59 API calls __vswprintf_l 98447->98459 98449 d22f58 EncodePointer EncodePointer 98449->98446 98450 d22f2c 98450->98446 98454 d22f46 EncodePointer 98450->98454 98461 d28aa4 61 API calls 2 library calls 98450->98461 98451 d22f07 98451->98449 98451->98450 98460 d28aa4 61 API calls 2 library calls 98451->98460 98454->98449 98455 d22f40 98455->98446 98455->98454 98462 d23460 98456->98462 98459->98451 98460->98450 98461->98455 98465 d29fb5 LeaveCriticalSection 98462->98465 98464 d22ec7 98464->98441 98465->98464 98467 d29e4b __lock 58 API calls 98466->98467 98468 d235b7 DecodePointer EncodePointer 98467->98468 98531 d29fb5 LeaveCriticalSection 98468->98531 98470 d049a7 98471 d23614 98470->98471 98472 d23638 98471->98472 98473 d2361e 98471->98473 98472->98316 98473->98472 98532 d28d68 58 API calls __getptd_noexit 98473->98532 98475 d23628 98533 d28ff6 9 API calls __vswprintf_l 98475->98533 98477 d23633 98477->98316 98478->98318 98480 d03b59 __ftell_nolock 98479->98480 98534 d077c7 98480->98534 98484 d03b8c IsDebuggerPresent 98485 d03b9a 98484->98485 98486 d3d4ad MessageBoxA 98484->98486 98488 d3d4c7 98485->98488 98489 d03bb7 98485->98489 98517 d03c73 98485->98517 98486->98488 98487 d03c7a SetCurrentDirectoryW 98490 d03c87 Mailbox 98487->98490 98758 d07373 59 API calls Mailbox 98488->98758 98620 d073e5 98489->98620 98490->98320 98494 d3d4d7 98498 d3d4ed SetCurrentDirectoryW 98494->98498 98495 d03bd5 GetFullPathNameW 98636 d07d2c 98495->98636 98497 d03c10 98645 d10a8d 98497->98645 98498->98490 98501 d03c2e 98502 d03c38 98501->98502 98759 d64c03 AllocateAndInitializeSid CheckTokenMembership FreeSid 98501->98759 98661 d03a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 98502->98661 98505 d3d50a 98505->98502 98508 d3d51b 98505->98508 98760 d04864 98508->98760 98517->98487 98531->98470 98532->98475 98533->98477 98787 d20ff6 98534->98787 98536 d077e8 98537 d20ff6 Mailbox 59 API calls 98536->98537 98538 d03b63 GetCurrentDirectoryW 98537->98538 98539 d03778 98538->98539 98540 d077c7 59 API calls 98539->98540 98541 d0378e 98540->98541 98825 d03d43 98541->98825 98543 d037ac 98544 d04864 61 API calls 98543->98544 98545 d037c0 98544->98545 98546 d07f41 59 API calls 98545->98546 98547 d037cd 98546->98547 98839 d04f3d 98547->98839 98550 d3d3ae 98910 d697e5 98550->98910 98551 d037ee Mailbox 98863 d081a7 98551->98863 98555 d3d3cd 98556 d22f95 _free 58 API calls 98555->98556 98559 d3d3da 98556->98559 98561 d04faa 84 API calls 98559->98561 98563 d3d3e3 98561->98563 98567 d03ee2 59 API calls 98563->98567 98564 d07f41 59 API calls 98565 d0381a 98564->98565 98870 d08620 98565->98870 98569 d3d3fe 98567->98569 98568 d0382c Mailbox 98570 d07f41 59 API calls 98568->98570 98571 d03ee2 59 API calls 98569->98571 98572 d03852 98570->98572 98573 d3d41a 98571->98573 98574 d08620 69 API calls 98572->98574 98575 d04864 61 API calls 98573->98575 98576 d03861 Mailbox 98574->98576 98577 d3d43f 98575->98577 98580 d077c7 59 API calls 98576->98580 98578 d03ee2 59 API calls 98577->98578 98579 d3d44b 98578->98579 98581 d081a7 59 API calls 98579->98581 98582 d0387f 98580->98582 98583 d3d459 98581->98583 98874 d03ee2 98582->98874 98585 d03ee2 59 API calls 98583->98585 98587 d3d468 98585->98587 98593 d081a7 59 API calls 98587->98593 98589 d03899 98589->98563 98590 d038a3 98589->98590 98591 d2313d _W_store_winword 60 API calls 98590->98591 98592 d038ae 98591->98592 98592->98569 98594 d038b8 98592->98594 98595 d3d48a 98593->98595 98596 d2313d _W_store_winword 60 API calls 98594->98596 98597 d03ee2 59 API calls 98595->98597 98598 d038c3 98596->98598 98599 d3d497 98597->98599 98598->98573 98600 d038cd 98598->98600 98599->98599 98601 d2313d _W_store_winword 60 API calls 98600->98601 98603 d038d8 98601->98603 98602 d03919 98602->98587 98604 d03926 98602->98604 98603->98587 98603->98602 98605 d03ee2 59 API calls 98603->98605 98890 d0942e 98604->98890 98606 d038fc 98605->98606 98608 d081a7 59 API calls 98606->98608 98610 d0390a 98608->98610 98612 d03ee2 59 API calls 98610->98612 98612->98602 98615 d093ea 59 API calls 98617 d03961 98615->98617 98616 d09040 60 API calls 98616->98617 98617->98615 98617->98616 98618 d03ee2 59 API calls 98617->98618 98619 d039a7 Mailbox 98617->98619 98618->98617 98619->98484 98621 d073f2 __ftell_nolock 98620->98621 98622 d3ee4b _memset 98621->98622 98623 d0740b 98621->98623 98626 d3ee67 GetOpenFileNameW 98622->98626 99774 d048ae 98623->99774 98628 d3eeb6 98626->98628 98629 d07d2c 59 API calls 98628->98629 98631 d3eecb 98629->98631 98631->98631 98633 d07429 99802 d069ca 98633->99802 98637 d07da5 98636->98637 98638 d07d38 __wsetenvp 98636->98638 98639 d07e8c 59 API calls 98637->98639 98641 d07d73 98638->98641 98642 d07d4e 98638->98642 98640 d07d56 _memmove 98639->98640 98640->98497 98644 d08189 59 API calls 98641->98644 100121 d08087 59 API calls Mailbox 98642->100121 98644->98640 98646 d10a9a __ftell_nolock 98645->98646 100122 d06ee0 98646->100122 98648 d10a9f 98649 d03c26 98648->98649 100133 d112fe 89 API calls 98648->100133 98649->98494 98649->98501 98651 d10aac 98651->98649 100134 d14047 91 API calls Mailbox 98651->100134 98653 d10ab5 98653->98649 98654 d10ab9 GetFullPathNameW 98653->98654 98655 d07d2c 59 API calls 98654->98655 98662 d03ac2 LoadImageW RegisterClassExW 98661->98662 98663 d3d49c 98661->98663 100176 d03041 7 API calls 98662->100176 100177 d048fe LoadImageW EnumResourceNamesW 98663->100177 98666 d03b46 98667 d3d4a5 98758->98494 98759->98505 98761 d31b90 __ftell_nolock 98760->98761 98790 d20ffe 98787->98790 98789 d21018 98789->98536 98790->98789 98792 d2101c std::exception::exception 98790->98792 98797 d2594c 98790->98797 98814 d235e1 DecodePointer 98790->98814 98815 d287db RaiseException 98792->98815 98794 d21046 98816 d28711 58 API calls _free 98794->98816 98796 d21058 98796->98536 98798 d259c7 98797->98798 98802 d25958 98797->98802 98823 d235e1 DecodePointer 98798->98823 98800 d259cd 98824 d28d68 58 API calls __getptd_noexit 98800->98824 98804 d25963 98802->98804 98805 d2598b RtlAllocateHeap 98802->98805 98808 d259b3 98802->98808 98812 d259b1 98802->98812 98820 d235e1 DecodePointer 98802->98820 98804->98802 98817 d2a3ab 58 API calls 2 library calls 98804->98817 98818 d2a408 58 API calls 8 library calls 98804->98818 98819 d232df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98804->98819 98805->98802 98806 d259bf 98805->98806 98806->98790 98821 d28d68 58 API calls __getptd_noexit 98808->98821 98822 d28d68 58 API calls __getptd_noexit 98812->98822 98814->98790 98815->98794 98816->98796 98817->98804 98818->98804 98820->98802 98821->98812 98822->98806 98823->98800 98824->98806 98826 d03d50 __ftell_nolock 98825->98826 98827 d07d2c 59 API calls 98826->98827 98836 d03eb6 Mailbox 98826->98836 98829 d03d82 98827->98829 98830 d03db8 Mailbox 98829->98830 98951 d07b52 98829->98951 98831 d03e89 98830->98831 98833 d07f41 59 API calls 98830->98833 98830->98836 98838 d07b52 59 API calls 98830->98838 98954 d03f84 98830->98954 98832 d07f41 59 API calls 98831->98832 98831->98836 98834 d03eaa 98832->98834 98833->98830 98835 d03f84 59 API calls 98834->98835 98835->98836 98836->98543 98838->98830 98964 d04d13 98839->98964 98844 d04f68 LoadLibraryExW 98974 d04cc8 98844->98974 98845 d3dd0f 98846 d04faa 84 API calls 98845->98846 98848 d3dd16 98846->98848 98851 d04cc8 3 API calls 98848->98851 98853 d3dd1e 98851->98853 98852 d04f8f 98852->98853 98854 d04f9b 98852->98854 99000 d0506b 98853->99000 98855 d04faa 84 API calls 98854->98855 98857 d037e6 98855->98857 98857->98550 98857->98551 98860 d3dd45 99006 d05027 98860->99006 98862 d3dd52 98864 d081b2 98863->98864 98865 d03801 98863->98865 99431 d080d7 59 API calls 2 library calls 98864->99431 98867 d093ea 98865->98867 98868 d20ff6 Mailbox 59 API calls 98867->98868 98869 d0380d 98868->98869 98869->98564 98871 d0862b 98870->98871 98873 d08652 98871->98873 99432 d08b13 69 API calls Mailbox 98871->99432 98873->98568 98875 d03f05 98874->98875 98876 d03eec 98874->98876 98878 d07d2c 59 API calls 98875->98878 98877 d081a7 59 API calls 98876->98877 98879 d0388b 98877->98879 98878->98879 98880 d2313d 98879->98880 98881 d23149 98880->98881 98882 d231be 98880->98882 98889 d2316e 98881->98889 99433 d28d68 58 API calls __getptd_noexit 98881->99433 99435 d231d0 60 API calls 3 library calls 98882->99435 98885 d231cb 98885->98589 98886 d23155 99434 d28ff6 9 API calls __vswprintf_l 98886->99434 98888 d23160 98888->98589 98889->98589 98891 d09436 98890->98891 98892 d20ff6 Mailbox 59 API calls 98891->98892 98893 d09444 98892->98893 98894 d03936 98893->98894 99436 d0935c 59 API calls Mailbox 98893->99436 98896 d091b0 98894->98896 99437 d092c0 98896->99437 98898 d091bf 98899 d20ff6 Mailbox 59 API calls 98898->98899 98900 d03944 98898->98900 98899->98900 98901 d09040 98900->98901 98902 d3f5a5 98901->98902 98904 d09057 98901->98904 98902->98904 99452 d08d3b 59 API calls Mailbox 98902->99452 98905 d091a0 98904->98905 98906 d09158 98904->98906 98909 d0915f 98904->98909 99451 d09e9c 60 API calls Mailbox 98905->99451 98908 d20ff6 Mailbox 59 API calls 98906->98908 98908->98909 98909->98617 98911 d05045 85 API calls 98910->98911 98912 d69854 98911->98912 99453 d699be 96 API calls 2 library calls 98912->99453 98914 d69866 98915 d0506b 74 API calls 98914->98915 98943 d3d3c1 98914->98943 98916 d69881 98915->98916 98917 d0506b 74 API calls 98916->98917 98918 d69891 98917->98918 98919 d0506b 74 API calls 98918->98919 98920 d698ac 98919->98920 98921 d0506b 74 API calls 98920->98921 98922 d698c7 98921->98922 98923 d05045 85 API calls 98922->98923 98924 d698de 98923->98924 98925 d2594c __crtGetStringTypeA_stat 58 API calls 98924->98925 98926 d698e5 98925->98926 98927 d2594c __crtGetStringTypeA_stat 58 API calls 98926->98927 98928 d698ef 98927->98928 98929 d0506b 74 API calls 98928->98929 98930 d69903 98929->98930 99454 d69393 GetSystemTimeAsFileTime 98930->99454 98932 d69916 98933 d69940 98932->98933 98934 d6992b 98932->98934 98936 d69946 98933->98936 98937 d699a5 98933->98937 98935 d22f95 _free 58 API calls 98934->98935 98938 d69931 98935->98938 99455 d68d90 98936->99455 98940 d22f95 _free 58 API calls 98937->98940 98941 d22f95 _free 58 API calls 98938->98941 98940->98943 98941->98943 98943->98555 98945 d04faa 98943->98945 98944 d22f95 _free 58 API calls 98944->98943 98946 d04fb4 98945->98946 98950 d04fbb 98945->98950 98947 d255d6 __fcloseall 83 API calls 98946->98947 98947->98950 98948 d04fca 98948->98555 98949 d04fdb FreeLibrary 98949->98948 98950->98948 98950->98949 98960 d07faf 98951->98960 98953 d07b5d 98953->98829 98955 d03f92 98954->98955 98959 d03fb4 _memmove 98954->98959 98957 d20ff6 Mailbox 59 API calls 98955->98957 98956 d20ff6 Mailbox 59 API calls 98958 d03fc8 98956->98958 98957->98959 98958->98830 98959->98956 98961 d07fc2 98960->98961 98963 d07fbf _memmove 98960->98963 98962 d20ff6 Mailbox 59 API calls 98961->98962 98962->98963 98963->98953 99011 d04d61 98964->99011 98967 d04d3a 98969 d04d53 98967->98969 98970 d04d4a FreeLibrary 98967->98970 98968 d04d61 2 API calls 98968->98967 98971 d2548b 98969->98971 98970->98969 99015 d254a0 98971->99015 98973 d04f5c 98973->98844 98973->98845 99173 d04d94 98974->99173 98977 d04d94 2 API calls 98980 d04ced 98977->98980 98978 d04d08 98981 d04dd0 98978->98981 98979 d04cff FreeLibrary 98979->98978 98980->98978 98980->98979 98982 d20ff6 Mailbox 59 API calls 98981->98982 98983 d04de5 98982->98983 99177 d0538e 98983->99177 98985 d04df1 _memmove 98986 d04e2c 98985->98986 98988 d04f21 98985->98988 98989 d04ee9 98985->98989 98987 d05027 69 API calls 98986->98987 98993 d04e35 98987->98993 99191 d69ba5 95 API calls 98988->99191 99180 d04fe9 CreateStreamOnHGlobal 98989->99180 98992 d0506b 74 API calls 98992->98993 98993->98992 98995 d04ec9 98993->98995 98996 d3dcd0 98993->98996 99186 d05045 98993->99186 98995->98852 98997 d05045 85 API calls 98996->98997 98998 d3dce4 98997->98998 98999 d0506b 74 API calls 98998->98999 98999->98995 99001 d3ddf6 99000->99001 99002 d0507d 99000->99002 99215 d25812 99002->99215 99005 d69393 GetSystemTimeAsFileTime 99005->98860 99007 d05036 99006->99007 99008 d3ddb9 99006->99008 99413 d25e90 99007->99413 99010 d0503e 99010->98862 99012 d04d2e 99011->99012 99013 d04d6a LoadLibraryA 99011->99013 99012->98967 99012->98968 99013->99012 99014 d04d7b GetProcAddress 99013->99014 99014->99012 99018 d254ac __alloc_osfhnd 99015->99018 99016 d254bf 99064 d28d68 58 API calls __getptd_noexit 99016->99064 99018->99016 99020 d254f0 99018->99020 99019 d254c4 99065 d28ff6 9 API calls __vswprintf_l 99019->99065 99034 d30738 99020->99034 99023 d254f5 99024 d2550b 99023->99024 99025 d254fe 99023->99025 99027 d25535 99024->99027 99028 d25515 99024->99028 99066 d28d68 58 API calls __getptd_noexit 99025->99066 99049 d30857 99027->99049 99067 d28d68 58 API calls __getptd_noexit 99028->99067 99033 d254cf __alloc_osfhnd @_EH4_CallFilterFunc@8 99033->98973 99035 d30744 __alloc_osfhnd 99034->99035 99036 d29e4b __lock 58 API calls 99035->99036 99037 d30752 99036->99037 99038 d307cd 99037->99038 99044 d29ed3 __mtinitlocknum 58 API calls 99037->99044 99047 d307c6 99037->99047 99072 d26e8d 59 API calls __lock 99037->99072 99073 d26ef7 LeaveCriticalSection LeaveCriticalSection _doexit 99037->99073 99074 d28a5d 58 API calls 2 library calls 99038->99074 99041 d307d4 99041->99047 99075 d2a06b InitializeCriticalSectionAndSpinCount 99041->99075 99042 d30843 __alloc_osfhnd 99042->99023 99044->99037 99046 d307fa EnterCriticalSection 99046->99047 99069 d3084e 99047->99069 99058 d30877 __wopenfile 99049->99058 99050 d30891 99080 d28d68 58 API calls __getptd_noexit 99050->99080 99051 d30a4c 99051->99050 99056 d30aaf 99051->99056 99053 d30896 99081 d28ff6 9 API calls __vswprintf_l 99053->99081 99055 d25540 99068 d25562 LeaveCriticalSection LeaveCriticalSection _fprintf 99055->99068 99077 d387f1 99056->99077 99058->99050 99058->99051 99082 d23a0b 60 API calls 2 library calls 99058->99082 99060 d30a45 99060->99051 99083 d23a0b 60 API calls 2 library calls 99060->99083 99062 d30a64 99062->99051 99084 d23a0b 60 API calls 2 library calls 99062->99084 99064->99019 99065->99033 99066->99033 99067->99033 99068->99033 99076 d29fb5 LeaveCriticalSection 99069->99076 99071 d30855 99071->99042 99072->99037 99073->99037 99074->99041 99075->99046 99076->99071 99085 d37fd5 99077->99085 99079 d3880a 99079->99055 99080->99053 99081->99055 99082->99060 99083->99062 99084->99051 99086 d37fe1 __alloc_osfhnd 99085->99086 99087 d37ff7 99086->99087 99090 d3802d 99086->99090 99170 d28d68 58 API calls __getptd_noexit 99087->99170 99089 d37ffc 99171 d28ff6 9 API calls __vswprintf_l 99089->99171 99096 d3809e 99090->99096 99093 d38049 99172 d38072 LeaveCriticalSection __unlock_fhandle 99093->99172 99095 d38006 __alloc_osfhnd 99095->99079 99097 d380be 99096->99097 99098 d2471a __wsopen_nolock 58 API calls 99097->99098 99101 d380da 99098->99101 99099 d29006 __invoke_watson 8 API calls 99100 d387f0 99099->99100 99103 d37fd5 __wsopen_helper 103 API calls 99100->99103 99102 d38114 99101->99102 99109 d38137 99101->99109 99119 d38211 99101->99119 99104 d28d34 __close 58 API calls 99102->99104 99105 d3880a 99103->99105 99106 d38119 99104->99106 99105->99093 99107 d28d68 __vswprintf_l 58 API calls 99106->99107 99108 d38126 99107->99108 99111 d28ff6 __vswprintf_l 9 API calls 99108->99111 99110 d381f5 99109->99110 99118 d381d3 99109->99118 99112 d28d34 __close 58 API calls 99110->99112 99113 d38130 99111->99113 99114 d381fa 99112->99114 99113->99093 99115 d28d68 __vswprintf_l 58 API calls 99114->99115 99116 d38207 99115->99116 99117 d28ff6 __vswprintf_l 9 API calls 99116->99117 99117->99119 99120 d2d4d4 __alloc_osfhnd 61 API calls 99118->99120 99119->99099 99121 d382a1 99120->99121 99122 d382ab 99121->99122 99123 d382ce 99121->99123 99124 d28d34 __close 58 API calls 99122->99124 99125 d37f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99123->99125 99126 d382b0 99124->99126 99136 d382f0 99125->99136 99127 d28d68 __vswprintf_l 58 API calls 99126->99127 99129 d382ba 99127->99129 99128 d3836e GetFileType 99130 d383bb 99128->99130 99131 d38379 GetLastError 99128->99131 99134 d28d68 __vswprintf_l 58 API calls 99129->99134 99140 d2d76a __set_osfhnd 59 API calls 99130->99140 99135 d28d47 __dosmaperr 58 API calls 99131->99135 99132 d3833c GetLastError 99133 d28d47 __dosmaperr 58 API calls 99132->99133 99137 d38361 99133->99137 99134->99113 99138 d383a0 CloseHandle 99135->99138 99136->99128 99136->99132 99139 d37f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99136->99139 99143 d28d68 __vswprintf_l 58 API calls 99137->99143 99138->99137 99141 d383ae 99138->99141 99142 d38331 99139->99142 99147 d383d9 99140->99147 99144 d28d68 __vswprintf_l 58 API calls 99141->99144 99142->99128 99142->99132 99143->99119 99145 d383b3 99144->99145 99145->99137 99146 d38594 99146->99119 99149 d38767 CloseHandle 99146->99149 99147->99146 99148 d31b11 __lseeki64_nolock 60 API calls 99147->99148 99165 d3845a 99147->99165 99150 d38443 99148->99150 99151 d37f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99149->99151 99153 d28d34 __close 58 API calls 99150->99153 99150->99165 99152 d3878e 99151->99152 99154 d38796 GetLastError 99152->99154 99155 d387c2 99152->99155 99153->99165 99156 d28d47 __dosmaperr 58 API calls 99154->99156 99155->99119 99159 d387a2 99156->99159 99157 d3848c 99162 d399f2 __chsize_nolock 82 API calls 99157->99162 99157->99165 99158 d31b11 60 API calls __lseeki64_nolock 99158->99165 99163 d2d67d __free_osfhnd 59 API calls 99159->99163 99160 d30d2d __close_nolock 61 API calls 99160->99165 99161 d310ab 70 API calls __read_nolock 99161->99165 99162->99157 99163->99155 99164 d2dac6 __write 78 API calls 99164->99165 99165->99146 99165->99157 99165->99158 99165->99160 99165->99161 99165->99164 99166 d38611 99165->99166 99167 d30d2d __close_nolock 61 API calls 99166->99167 99168 d38618 99167->99168 99169 d28d68 __vswprintf_l 58 API calls 99168->99169 99169->99119 99170->99089 99171->99095 99172->99095 99174 d04ce1 99173->99174 99175 d04d9d LoadLibraryA 99173->99175 99174->98977 99174->98980 99175->99174 99176 d04dae GetProcAddress 99175->99176 99176->99174 99178 d20ff6 Mailbox 59 API calls 99177->99178 99179 d053a0 99178->99179 99179->98985 99181 d05003 FindResourceExW 99180->99181 99182 d05020 99180->99182 99181->99182 99183 d3dd5c LoadResource 99181->99183 99182->98986 99183->99182 99184 d3dd71 SizeofResource 99183->99184 99184->99182 99185 d3dd85 LockResource 99184->99185 99185->99182 99187 d05054 99186->99187 99188 d3ddd4 99186->99188 99192 d25a7d 99187->99192 99190 d05062 99190->98993 99191->98986 99193 d25a89 __alloc_osfhnd 99192->99193 99194 d25a9b 99193->99194 99196 d25ac1 99193->99196 99205 d28d68 58 API calls __getptd_noexit 99194->99205 99207 d26e4e 99196->99207 99198 d25aa0 99206 d28ff6 9 API calls __vswprintf_l 99198->99206 99199 d25ac7 99213 d259ee 83 API calls 5 library calls 99199->99213 99202 d25ad6 99214 d25af8 LeaveCriticalSection LeaveCriticalSection _fprintf 99202->99214 99204 d25aab __alloc_osfhnd 99204->99190 99205->99198 99206->99204 99208 d26e80 EnterCriticalSection 99207->99208 99209 d26e5e 99207->99209 99212 d26e76 99208->99212 99209->99208 99210 d26e66 99209->99210 99211 d29e4b __lock 58 API calls 99210->99211 99211->99212 99212->99199 99213->99202 99214->99204 99218 d2582d 99215->99218 99217 d0508e 99217->99005 99219 d25839 __alloc_osfhnd 99218->99219 99220 d2587c 99219->99220 99221 d25874 __alloc_osfhnd 99219->99221 99227 d2584f _memset 99219->99227 99222 d26e4e __lock_file 59 API calls 99220->99222 99221->99217 99224 d25882 99222->99224 99231 d2564d 99224->99231 99225 d25869 99246 d28ff6 9 API calls __vswprintf_l 99225->99246 99245 d28d68 58 API calls __getptd_noexit 99227->99245 99234 d25668 _memset 99231->99234 99237 d25683 99231->99237 99232 d25673 99343 d28d68 58 API calls __getptd_noexit 99232->99343 99234->99232 99234->99237 99242 d256c3 99234->99242 99235 d25678 99344 d28ff6 9 API calls __vswprintf_l 99235->99344 99247 d258b6 LeaveCriticalSection LeaveCriticalSection _fprintf 99237->99247 99239 d257d4 _memset 99346 d28d68 58 API calls __getptd_noexit 99239->99346 99242->99237 99242->99239 99248 d24916 99242->99248 99255 d310ab 99242->99255 99323 d30df7 99242->99323 99345 d30f18 58 API calls 3 library calls 99242->99345 99245->99225 99246->99221 99247->99221 99249 d24920 99248->99249 99250 d24935 99248->99250 99347 d28d68 58 API calls __getptd_noexit 99249->99347 99250->99242 99252 d24925 99348 d28ff6 9 API calls __vswprintf_l 99252->99348 99254 d24930 99254->99242 99256 d310e3 99255->99256 99257 d310cc 99255->99257 99258 d3181b 99256->99258 99262 d3111d 99256->99262 99358 d28d34 58 API calls __getptd_noexit 99257->99358 99374 d28d34 58 API calls __getptd_noexit 99258->99374 99261 d310d1 99359 d28d68 58 API calls __getptd_noexit 99261->99359 99265 d31125 99262->99265 99272 d3113c 99262->99272 99263 d31820 99375 d28d68 58 API calls __getptd_noexit 99263->99375 99360 d28d34 58 API calls __getptd_noexit 99265->99360 99268 d31131 99376 d28ff6 9 API calls __vswprintf_l 99268->99376 99269 d3112a 99361 d28d68 58 API calls __getptd_noexit 99269->99361 99271 d31151 99362 d28d34 58 API calls __getptd_noexit 99271->99362 99272->99271 99273 d3116b 99272->99273 99276 d31189 99272->99276 99305 d310d8 99272->99305 99273->99271 99278 d31176 99273->99278 99363 d28a5d 58 API calls 2 library calls 99276->99363 99349 d35ebb 99278->99349 99279 d31199 99282 d311a1 99279->99282 99283 d311bc 99279->99283 99281 d3128a 99284 d31303 ReadFile 99281->99284 99287 d312a0 GetConsoleMode 99281->99287 99364 d28d68 58 API calls __getptd_noexit 99282->99364 99366 d31b11 60 API calls 3 library calls 99283->99366 99288 d317e3 GetLastError 99284->99288 99289 d31325 99284->99289 99291 d31300 99287->99291 99292 d312b4 99287->99292 99293 d317f0 99288->99293 99294 d312e3 99288->99294 99289->99288 99297 d312f5 99289->99297 99290 d311a6 99365 d28d34 58 API calls __getptd_noexit 99290->99365 99291->99284 99292->99291 99298 d312ba ReadConsoleW 99292->99298 99372 d28d68 58 API calls __getptd_noexit 99293->99372 99299 d312e9 99294->99299 99367 d28d47 58 API calls 3 library calls 99294->99367 99297->99299 99304 d3135a 99297->99304 99312 d315c7 99297->99312 99298->99297 99301 d312dd GetLastError 99298->99301 99299->99305 99306 d22f95 _free 58 API calls 99299->99306 99300 d317f5 99373 d28d34 58 API calls __getptd_noexit 99300->99373 99301->99294 99308 d313c6 ReadFile 99304->99308 99314 d31447 99304->99314 99305->99242 99306->99305 99309 d313e7 GetLastError 99308->99309 99322 d313f1 99308->99322 99309->99322 99310 d31504 99317 d314b4 MultiByteToWideChar 99310->99317 99370 d31b11 60 API calls 3 library calls 99310->99370 99311 d314f4 99369 d28d68 58 API calls __getptd_noexit 99311->99369 99312->99299 99313 d316cd ReadFile 99312->99313 99316 d316f0 GetLastError 99313->99316 99321 d316fe 99313->99321 99314->99299 99314->99310 99314->99311 99314->99317 99316->99321 99317->99299 99317->99301 99321->99312 99371 d31b11 60 API calls 3 library calls 99321->99371 99322->99304 99368 d31b11 60 API calls 3 library calls 99322->99368 99324 d30e02 99323->99324 99327 d30e17 99323->99327 99410 d28d68 58 API calls __getptd_noexit 99324->99410 99326 d30e07 99411 d28ff6 9 API calls __vswprintf_l 99326->99411 99329 d30e4c 99327->99329 99334 d30e12 99327->99334 99412 d36234 58 API calls __malloc_crt 99327->99412 99331 d24916 _fprintf 58 API calls 99329->99331 99332 d30e60 99331->99332 99377 d30f97 99332->99377 99334->99242 99335 d30e67 99335->99334 99336 d24916 _fprintf 58 API calls 99335->99336 99337 d30e8a 99336->99337 99337->99334 99338 d24916 _fprintf 58 API calls 99337->99338 99339 d30e96 99338->99339 99339->99334 99340 d24916 _fprintf 58 API calls 99339->99340 99341 d30ea3 99340->99341 99342 d24916 _fprintf 58 API calls 99341->99342 99342->99334 99343->99235 99344->99237 99345->99242 99346->99235 99347->99252 99348->99254 99350 d35ed3 99349->99350 99351 d35ec6 99349->99351 99353 d35edf 99350->99353 99354 d28d68 __vswprintf_l 58 API calls 99350->99354 99352 d28d68 __vswprintf_l 58 API calls 99351->99352 99355 d35ecb 99352->99355 99353->99281 99356 d35f00 99354->99356 99355->99281 99357 d28ff6 __vswprintf_l 9 API calls 99356->99357 99357->99355 99358->99261 99359->99305 99360->99269 99361->99268 99362->99269 99363->99279 99364->99290 99365->99305 99366->99278 99367->99299 99368->99322 99369->99299 99370->99317 99371->99321 99372->99300 99373->99299 99374->99263 99375->99268 99376->99305 99378 d30fa3 __alloc_osfhnd 99377->99378 99379 d30fb0 99378->99379 99380 d30fc7 99378->99380 99381 d28d34 __close 58 API calls 99379->99381 99382 d3108b 99380->99382 99383 d30fdb 99380->99383 99385 d30fb5 99381->99385 99384 d28d34 __close 58 API calls 99382->99384 99386 d31006 99383->99386 99387 d30ff9 99383->99387 99388 d30ffe 99384->99388 99389 d28d68 __vswprintf_l 58 API calls 99385->99389 99391 d31013 99386->99391 99392 d31028 99386->99392 99390 d28d34 __close 58 API calls 99387->99390 99396 d28d68 __vswprintf_l 58 API calls 99388->99396 99393 d30fbc __alloc_osfhnd 99389->99393 99390->99388 99394 d28d34 __close 58 API calls 99391->99394 99395 d2d446 ___lock_fhandle 59 API calls 99392->99395 99393->99335 99397 d31018 99394->99397 99398 d3102e 99395->99398 99399 d31020 99396->99399 99400 d28d68 __vswprintf_l 58 API calls 99397->99400 99401 d31041 99398->99401 99402 d31054 99398->99402 99405 d28ff6 __vswprintf_l 9 API calls 99399->99405 99400->99399 99404 d310ab __read_nolock 70 API calls 99401->99404 99403 d28d68 __vswprintf_l 58 API calls 99402->99403 99406 d31059 99403->99406 99407 d3104d 99404->99407 99405->99393 99408 d28d34 __close 58 API calls 99406->99408 99409 d31083 __read LeaveCriticalSection 99407->99409 99408->99407 99409->99393 99410->99326 99411->99334 99412->99329 99414 d25e9c __alloc_osfhnd 99413->99414 99415 d25ec3 99414->99415 99416 d25eae 99414->99416 99418 d26e4e __lock_file 59 API calls 99415->99418 99427 d28d68 58 API calls __getptd_noexit 99416->99427 99420 d25ec9 99418->99420 99419 d25eb3 99428 d28ff6 9 API calls __vswprintf_l 99419->99428 99429 d25b00 67 API calls 6 library calls 99420->99429 99423 d25ebe __alloc_osfhnd 99423->99010 99424 d25ed4 99430 d25ef4 LeaveCriticalSection LeaveCriticalSection _fprintf 99424->99430 99426 d25ee6 99426->99423 99427->99419 99428->99423 99429->99424 99430->99426 99431->98865 99432->98873 99433->98886 99434->98888 99435->98885 99436->98894 99438 d092c9 Mailbox 99437->99438 99439 d3f5c8 99438->99439 99444 d092d3 99438->99444 99440 d20ff6 Mailbox 59 API calls 99439->99440 99442 d3f5d4 99440->99442 99441 d092da 99441->98898 99444->99441 99445 d09df0 99444->99445 99447 d09dfb 99445->99447 99446 d09e32 99446->99444 99447->99446 99450 d08e34 59 API calls Mailbox 99447->99450 99449 d09e5d 99449->99444 99450->99449 99451->98909 99452->98904 99453->98914 99454->98932 99456 d68d9b 99455->99456 99458 d68da9 99455->99458 99457 d2548b 115 API calls 99456->99457 99457->99458 99459 d68dee 99458->99459 99460 d2548b 115 API calls 99458->99460 99485 d68db2 99458->99485 99486 d6901b 99459->99486 99461 d68dd3 99460->99461 99461->99459 99463 d68ddc 99461->99463 99467 d255d6 __fcloseall 83 API calls 99463->99467 99463->99485 99464 d68e32 99465 d68e36 99464->99465 99466 d68e57 99464->99466 99469 d68e43 99465->99469 99470 d255d6 __fcloseall 83 API calls 99465->99470 99490 d68c33 99466->99490 99467->99485 99472 d255d6 __fcloseall 83 API calls 99469->99472 99469->99485 99470->99469 99472->99485 99473 d68e85 99499 d68eb5 99473->99499 99474 d68e65 99476 d68e72 99474->99476 99478 d255d6 __fcloseall 83 API calls 99474->99478 99479 d255d6 __fcloseall 83 API calls 99476->99479 99476->99485 99478->99476 99479->99485 99482 d68ea0 99484 d255d6 __fcloseall 83 API calls 99482->99484 99482->99485 99484->99485 99485->98944 99487 d69040 99486->99487 99489 d69029 __tzset_nolock _memmove 99486->99489 99488 d25812 __fread_nolock 74 API calls 99487->99488 99488->99489 99489->99464 99491 d2594c __crtGetStringTypeA_stat 58 API calls 99490->99491 99492 d68c42 99491->99492 99493 d2594c __crtGetStringTypeA_stat 58 API calls 99492->99493 99494 d68c56 99493->99494 99495 d2594c __crtGetStringTypeA_stat 58 API calls 99494->99495 99496 d68c6a 99495->99496 99497 d68f97 58 API calls 99496->99497 99498 d68c7d 99496->99498 99497->99498 99498->99473 99498->99474 99506 d68eca 99499->99506 99500 d68f82 99532 d691bf 99500->99532 99502 d68e8c 99507 d68f97 99502->99507 99503 d68c8f 74 API calls 99503->99506 99506->99500 99506->99502 99506->99503 99528 d6909c 99506->99528 99536 d68d2b 74 API calls 99506->99536 99508 d68fa4 99507->99508 99510 d68faa 99507->99510 99509 d22f95 _free 58 API calls 99508->99509 99509->99510 99511 d22f95 _free 58 API calls 99510->99511 99512 d68fbb 99510->99512 99511->99512 99513 d68e93 99512->99513 99514 d22f95 _free 58 API calls 99512->99514 99513->99482 99515 d255d6 99513->99515 99514->99513 99516 d255e2 __alloc_osfhnd 99515->99516 99517 d255f6 99516->99517 99518 d2560e 99516->99518 99585 d28d68 58 API calls __getptd_noexit 99517->99585 99520 d25606 __alloc_osfhnd 99518->99520 99521 d26e4e __lock_file 59 API calls 99518->99521 99520->99482 99523 d25620 99521->99523 99522 d255fb 99586 d28ff6 9 API calls __vswprintf_l 99522->99586 99569 d2556a 99523->99569 99529 d690ab 99528->99529 99530 d690eb 99528->99530 99529->99506 99530->99529 99537 d69172 99530->99537 99533 d691dd 99532->99533 99534 d691cc 99532->99534 99533->99502 99535 d24a93 80 API calls 99534->99535 99535->99533 99536->99506 99538 d6919e 99537->99538 99540 d691af 99537->99540 99541 d24a93 99538->99541 99540->99530 99542 d24a9f __alloc_osfhnd 99541->99542 99543 d24ad5 99542->99543 99544 d24abd 99542->99544 99546 d24acd __alloc_osfhnd 99542->99546 99547 d26e4e __lock_file 59 API calls 99543->99547 99566 d28d68 58 API calls __getptd_noexit 99544->99566 99546->99540 99549 d24adb 99547->99549 99548 d24ac2 99567 d28ff6 9 API calls __vswprintf_l 99548->99567 99554 d2493a 99549->99554 99557 d24949 99554->99557 99561 d24967 99554->99561 99555 d24957 99556 d28d68 __vswprintf_l 58 API calls 99555->99556 99558 d2495c 99556->99558 99557->99555 99559 d24981 _memmove 99557->99559 99557->99561 99560 d28ff6 __vswprintf_l 9 API calls 99558->99560 99559->99561 99562 d2b05e __flsbuf 78 API calls 99559->99562 99563 d24c6d __flush 78 API calls 99559->99563 99564 d24916 _fprintf 58 API calls 99559->99564 99565 d2dac6 __write 78 API calls 99559->99565 99560->99561 99568 d24b0d LeaveCriticalSection LeaveCriticalSection _fprintf 99561->99568 99562->99559 99563->99559 99564->99559 99565->99559 99566->99548 99567->99546 99568->99546 99570 d25579 99569->99570 99571 d2558d 99569->99571 99624 d28d68 58 API calls __getptd_noexit 99570->99624 99573 d25589 99571->99573 99588 d24c6d 99571->99588 99587 d25645 LeaveCriticalSection LeaveCriticalSection _fprintf 99573->99587 99574 d2557e 99625 d28ff6 9 API calls __vswprintf_l 99574->99625 99580 d24916 _fprintf 58 API calls 99581 d255a7 99580->99581 99598 d30c52 99581->99598 99583 d255ad 99583->99573 99584 d22f95 _free 58 API calls 99583->99584 99584->99573 99585->99522 99586->99520 99587->99520 99589 d24c80 99588->99589 99593 d24ca4 99588->99593 99590 d24916 _fprintf 58 API calls 99589->99590 99589->99593 99591 d24c9d 99590->99591 99626 d2dac6 99591->99626 99594 d30dc7 99593->99594 99595 d30dd4 99594->99595 99597 d255a1 99594->99597 99596 d22f95 _free 58 API calls 99595->99596 99595->99597 99596->99597 99597->99580 99599 d30c5e __alloc_osfhnd 99598->99599 99600 d30c82 99599->99600 99601 d30c6b 99599->99601 99603 d30d0d 99600->99603 99605 d30c92 99600->99605 99751 d28d34 58 API calls __getptd_noexit 99601->99751 99756 d28d34 58 API calls __getptd_noexit 99603->99756 99604 d30c70 99752 d28d68 58 API calls __getptd_noexit 99604->99752 99609 d30cb0 99605->99609 99610 d30cba 99605->99610 99607 d30cb5 99757 d28d68 58 API calls __getptd_noexit 99607->99757 99753 d28d34 58 API calls __getptd_noexit 99609->99753 99612 d2d446 ___lock_fhandle 59 API calls 99610->99612 99614 d30cc0 99612->99614 99616 d30cd3 99614->99616 99617 d30cde 99614->99617 99615 d30d19 99758 d28ff6 9 API calls __vswprintf_l 99615->99758 99736 d30d2d 99616->99736 99754 d28d68 58 API calls __getptd_noexit 99617->99754 99620 d30c77 __alloc_osfhnd 99620->99583 99622 d30cd9 99755 d30d05 LeaveCriticalSection __unlock_fhandle 99622->99755 99624->99574 99625->99573 99627 d2dad2 __alloc_osfhnd 99626->99627 99628 d2daf6 99627->99628 99629 d2dadf 99627->99629 99631 d2db95 99628->99631 99633 d2db0a 99628->99633 99727 d28d34 58 API calls __getptd_noexit 99629->99727 99733 d28d34 58 API calls __getptd_noexit 99631->99733 99632 d2dae4 99728 d28d68 58 API calls __getptd_noexit 99632->99728 99636 d2db32 99633->99636 99637 d2db28 99633->99637 99654 d2d446 99636->99654 99729 d28d34 58 API calls __getptd_noexit 99637->99729 99638 d2db2d 99734 d28d68 58 API calls __getptd_noexit 99638->99734 99641 d2db38 99643 d2db4b 99641->99643 99644 d2db5e 99641->99644 99663 d2dbb5 99643->99663 99730 d28d68 58 API calls __getptd_noexit 99644->99730 99645 d2dba1 99735 d28ff6 9 API calls __vswprintf_l 99645->99735 99649 d2daeb __alloc_osfhnd 99649->99593 99650 d2db57 99732 d2db8d LeaveCriticalSection __unlock_fhandle 99650->99732 99651 d2db63 99731 d28d34 58 API calls __getptd_noexit 99651->99731 99655 d2d452 __alloc_osfhnd 99654->99655 99656 d2d4a1 EnterCriticalSection 99655->99656 99658 d29e4b __lock 58 API calls 99655->99658 99657 d2d4c7 __alloc_osfhnd 99656->99657 99657->99641 99659 d2d477 99658->99659 99660 d2d48f 99659->99660 99661 d2a06b __alloc_osfhnd InitializeCriticalSectionAndSpinCount 99659->99661 99662 d2d4cb ___lock_fhandle LeaveCriticalSection 99660->99662 99661->99660 99662->99656 99664 d2dbc2 __ftell_nolock 99663->99664 99665 d2dc20 99664->99665 99666 d2dc01 99664->99666 99694 d2dbf6 99664->99694 99669 d2dc78 99665->99669 99670 d2dc5c 99665->99670 99668 d28d34 __close 58 API calls 99666->99668 99667 d2c836 __except1 6 API calls 99671 d2e416 99667->99671 99672 d2dc06 99668->99672 99674 d2dc91 99669->99674 99676 d31b11 __lseeki64_nolock 60 API calls 99669->99676 99673 d28d34 __close 58 API calls 99670->99673 99671->99650 99675 d28d68 __vswprintf_l 58 API calls 99672->99675 99679 d2dc61 99673->99679 99678 d35ebb __stbuf 58 API calls 99674->99678 99677 d2dc0d 99675->99677 99676->99674 99680 d28ff6 __vswprintf_l 9 API calls 99677->99680 99681 d2dc9f 99678->99681 99682 d28d68 __vswprintf_l 58 API calls 99679->99682 99680->99694 99683 d2dff8 99681->99683 99688 d29bec ____lc_codepage_func 58 API calls 99681->99688 99684 d2dc68 99682->99684 99685 d2e016 99683->99685 99686 d2e38b WriteFile 99683->99686 99687 d28ff6 __vswprintf_l 9 API calls 99684->99687 99689 d2e13a 99685->99689 99698 d2e02c 99685->99698 99690 d2dfeb GetLastError 99686->99690 99696 d2dfb8 99686->99696 99687->99694 99691 d2dccb GetConsoleMode 99688->99691 99701 d2e145 99689->99701 99704 d2e22f 99689->99704 99690->99696 99691->99683 99693 d2dd0a 99691->99693 99692 d2e3c4 99692->99694 99695 d28d68 __vswprintf_l 58 API calls 99692->99695 99693->99683 99697 d2dd1a GetConsoleCP 99693->99697 99694->99667 99702 d2e3f2 99695->99702 99696->99692 99696->99694 99703 d2e118 99696->99703 99697->99692 99724 d2dd49 99697->99724 99698->99692 99699 d2e09b WriteFile 99698->99699 99699->99690 99700 d2e0d8 99699->99700 99700->99698 99705 d2e0fc 99700->99705 99701->99692 99706 d2e1aa WriteFile 99701->99706 99707 d28d34 __close 58 API calls 99702->99707 99708 d2e123 99703->99708 99709 d2e3bb 99703->99709 99704->99692 99710 d2e2a4 WideCharToMultiByte 99704->99710 99705->99696 99706->99690 99711 d2e1f9 99706->99711 99707->99694 99712 d28d68 __vswprintf_l 58 API calls 99708->99712 99713 d28d47 __dosmaperr 58 API calls 99709->99713 99710->99690 99719 d2e2eb 99710->99719 99711->99696 99711->99701 99711->99705 99715 d2e128 99712->99715 99713->99694 99714 d2e2f3 WriteFile 99717 d2e346 GetLastError 99714->99717 99714->99719 99718 d28d34 __close 58 API calls 99715->99718 99716 d23835 __write_nolock 58 API calls 99716->99724 99717->99719 99718->99694 99719->99696 99719->99704 99719->99705 99719->99714 99720 d37cae WriteConsoleW CreateFileW __putwch_nolock 99725 d2de9f 99720->99725 99721 d3650a 60 API calls __write_nolock 99721->99724 99722 d2de32 WideCharToMultiByte 99722->99696 99723 d2de6d WriteFile 99722->99723 99723->99690 99723->99725 99724->99696 99724->99716 99724->99721 99724->99722 99724->99725 99725->99690 99725->99696 99725->99720 99725->99724 99726 d2dec7 WriteFile 99725->99726 99726->99690 99726->99725 99727->99632 99728->99649 99729->99638 99730->99651 99731->99650 99732->99649 99733->99638 99734->99645 99735->99649 99759 d2d703 99736->99759 99738 d30d91 99772 d2d67d 59 API calls 2 library calls 99738->99772 99740 d30d3b 99740->99738 99741 d30d6f 99740->99741 99743 d2d703 __commit 58 API calls 99740->99743 99741->99738 99744 d2d703 __commit 58 API calls 99741->99744 99742 d30d99 99745 d30dbb 99742->99745 99773 d28d47 58 API calls 3 library calls 99742->99773 99746 d30d66 99743->99746 99747 d30d7b FindCloseChangeNotification 99744->99747 99745->99622 99749 d2d703 __commit 58 API calls 99746->99749 99747->99738 99750 d30d87 GetLastError 99747->99750 99749->99741 99750->99738 99751->99604 99752->99620 99753->99607 99754->99622 99755->99620 99756->99607 99757->99615 99758->99620 99760 d2d723 99759->99760 99761 d2d70e 99759->99761 99764 d28d34 __close 58 API calls 99760->99764 99766 d2d748 99760->99766 99762 d28d34 __close 58 API calls 99761->99762 99763 d2d713 99762->99763 99765 d28d68 __vswprintf_l 58 API calls 99763->99765 99767 d2d752 99764->99767 99768 d2d71b 99765->99768 99766->99740 99769 d28d68 __vswprintf_l 58 API calls 99767->99769 99768->99740 99770 d2d75a 99769->99770 99771 d28ff6 __vswprintf_l 9 API calls 99770->99771 99771->99768 99772->99742 99773->99745 99836 d31b90 99774->99836 99777 d048f7 99842 d07eec 99777->99842 99778 d048da 99779 d07d2c 59 API calls 99778->99779 99781 d048e6 99779->99781 99838 d07886 99781->99838 99784 d209d5 99785 d209e2 __ftell_nolock 99784->99785 99786 d209f1 GetLongPathNameW 99785->99786 99787 d07d2c 59 API calls 99786->99787 99788 d0741d 99787->99788 99789 d0716b 99788->99789 99790 d077c7 59 API calls 99789->99790 99791 d0717d 99790->99791 99792 d048ae 60 API calls 99791->99792 99793 d07188 99792->99793 99794 d07193 99793->99794 99795 d3ecae 99793->99795 99796 d03f84 59 API calls 99794->99796 99800 d3ecc8 99795->99800 99856 d07a68 61 API calls 99795->99856 99798 d0719f 99796->99798 99850 d034c2 99798->99850 99801 d071b2 Mailbox 99801->98633 99803 d04f3d 136 API calls 99802->99803 99804 d069ef 99803->99804 99805 d3e45a 99804->99805 99807 d04f3d 136 API calls 99804->99807 99806 d697e5 122 API calls 99805->99806 99809 d3e46f 99806->99809 99808 d06a03 99807->99808 99808->99805 99810 d06a0b 99808->99810 99811 d3e473 99809->99811 99812 d3e490 99809->99812 99813 d06a17 99810->99813 99814 d3e47b 99810->99814 99815 d04faa 84 API calls 99811->99815 99816 d20ff6 Mailbox 59 API calls 99812->99816 99857 d06bec 99813->99857 99950 d64534 90 API calls _wprintf 99814->99950 99815->99814 99825 d3e4d5 Mailbox 99816->99825 99820 d3e489 99820->99812 99821 d3e689 99822 d22f95 _free 58 API calls 99821->99822 99823 d3e691 99822->99823 99824 d04faa 84 API calls 99823->99824 99830 d3e69a 99824->99830 99825->99821 99825->99830 99833 d07f41 59 API calls 99825->99833 99951 d5fc4d 59 API calls 2 library calls 99825->99951 99952 d5fb6e 61 API calls 2 library calls 99825->99952 99953 d67621 59 API calls Mailbox 99825->99953 99954 d0766f 59 API calls 2 library calls 99825->99954 99955 d074bd 59 API calls Mailbox 99825->99955 99829 d22f95 _free 58 API calls 99829->99830 99830->99829 99831 d04faa 84 API calls 99830->99831 99956 d5fcb1 89 API calls 4 library calls 99830->99956 99831->99830 99833->99825 99837 d048bb GetFullPathNameW 99836->99837 99837->99777 99837->99778 99839 d07894 99838->99839 99846 d07e8c 99839->99846 99841 d048f2 99841->99784 99843 d07f06 99842->99843 99845 d07ef9 99842->99845 99844 d20ff6 Mailbox 59 API calls 99843->99844 99844->99845 99845->99781 99847 d07ea3 _memmove 99846->99847 99848 d07e9a 99846->99848 99847->99841 99848->99847 99849 d07faf 59 API calls 99848->99849 99849->99847 99851 d034d4 99850->99851 99855 d034f3 _memmove 99850->99855 99853 d20ff6 Mailbox 59 API calls 99851->99853 99852 d20ff6 Mailbox 59 API calls 99854 d0350a 99852->99854 99853->99855 99854->99801 99855->99852 99856->99795 99858 d3e847 99857->99858 99859 d06c15 99857->99859 100048 d5fcb1 89 API calls 4 library calls 99858->100048 99962 d05906 60 API calls Mailbox 99859->99962 99862 d3e85a 100049 d5fcb1 89 API calls 4 library calls 99862->100049 99863 d06c37 99963 d05956 99863->99963 99866 d06c54 99868 d077c7 59 API calls 99866->99868 99870 d06c60 99868->99870 99869 d3e876 99901 d06cc1 99869->99901 99976 d20b9b 60 API calls __ftell_nolock 99870->99976 99872 d06c6c 99876 d077c7 59 API calls 99872->99876 99873 d3e889 99877 d05dcf CloseHandle 99873->99877 99874 d06ccf 99875 d077c7 59 API calls 99874->99875 99878 d06cd8 99875->99878 99879 d06c78 99876->99879 99880 d3e895 99877->99880 99881 d077c7 59 API calls 99878->99881 99882 d048ae 60 API calls 99879->99882 99883 d04f3d 136 API calls 99880->99883 99885 d06ce1 99881->99885 99886 d06c86 99882->99886 99884 d3e8b1 99883->99884 99887 d3e8da 99884->99887 99890 d697e5 122 API calls 99884->99890 99986 d046f9 99885->99986 99977 d059b0 ReadFile SetFilePointerEx 99886->99977 100050 d5fcb1 89 API calls 4 library calls 99887->100050 99894 d3e8cd 99890->99894 99891 d06cf8 99895 d07c8e 59 API calls 99891->99895 99893 d06cb2 99978 d05c4e 99893->99978 99898 d3e8f6 99894->99898 99899 d3e8d5 99894->99899 99900 d06d09 SetCurrentDirectoryW 99895->99900 99896 d3e8f1 99928 d06e6c Mailbox 99896->99928 99903 d04faa 84 API calls 99898->99903 99902 d04faa 84 API calls 99899->99902 99901->99873 99901->99874 99902->99887 99904 d3e8fb 99903->99904 99905 d20ff6 Mailbox 59 API calls 99904->99905 99911 d3e92f 99905->99911 99909 d03bcd 99909->98495 99909->98517 100051 d0766f 59 API calls 2 library calls 99911->100051 99916 d3eb69 100057 d67581 59 API calls Mailbox 99916->100057 99921 d3eb8b 100058 d6f835 59 API calls 2 library calls 99921->100058 99924 d3eb98 99926 d22f95 _free 58 API calls 99924->99926 99926->99928 99957 d05934 99928->99957 99940 d07f41 59 API calls 99947 d3e978 Mailbox 99940->99947 99943 d3ebbb 100059 d5fcb1 89 API calls 4 library calls 99943->100059 99946 d3ebd4 99948 d22f95 _free 58 API calls 99946->99948 99947->99916 99947->99940 99947->99943 100052 d5fc4d 59 API calls 2 library calls 99947->100052 100053 d5fb6e 61 API calls 2 library calls 99947->100053 100054 d67621 59 API calls Mailbox 99947->100054 100055 d0766f 59 API calls 2 library calls 99947->100055 100056 d07373 59 API calls Mailbox 99947->100056 99949 d3ebe7 99948->99949 99949->99928 99950->99820 99951->99825 99952->99825 99953->99825 99954->99825 99955->99825 99956->99830 99958 d05dcf CloseHandle 99957->99958 99959 d0593c Mailbox 99958->99959 99960 d05dcf CloseHandle 99959->99960 99961 d0594b 99960->99961 99961->99909 99962->99863 99964 d05dcf CloseHandle 99963->99964 99965 d05962 99964->99965 100062 d05df9 99965->100062 99967 d05981 99968 d059a4 99967->99968 100070 d05770 99967->100070 99968->99862 99968->99866 99970 d05993 100087 d053db SetFilePointerEx SetFilePointerEx 99970->100087 99972 d0599a 99972->99968 99973 d3e030 99972->99973 100088 d63696 SetFilePointerEx SetFilePointerEx WriteFile 99973->100088 99975 d3e060 99975->99968 99976->99872 99977->99893 99985 d05c68 99978->99985 99979 d05cef SetFilePointerEx 100101 d05dae SetFilePointerEx 99979->100101 99981 d3e151 100102 d05dae SetFilePointerEx 99981->100102 99983 d3e16b 99984 d05cc3 99984->99901 99985->99979 99985->99981 99985->99984 99987 d077c7 59 API calls 99986->99987 99988 d0470f 99987->99988 99989 d077c7 59 API calls 99988->99989 99990 d04717 99989->99990 99991 d077c7 59 API calls 99990->99991 99992 d0471f 99991->99992 99993 d077c7 59 API calls 99992->99993 99994 d04727 99993->99994 99995 d3d8fb 99994->99995 99996 d0475b 99994->99996 99997 d081a7 59 API calls 99995->99997 99998 d079ab 59 API calls 99996->99998 99999 d3d904 99997->99999 100000 d04769 99998->100000 100001 d07eec 59 API calls 99999->100001 100002 d07e8c 59 API calls 100000->100002 100004 d0479e 100001->100004 100003 d04773 100002->100003 100003->100004 100005 d079ab 59 API calls 100003->100005 100006 d047de 100004->100006 100008 d047bd 100004->100008 100019 d3d924 100004->100019 100009 d04794 100005->100009 100103 d079ab 100006->100103 100013 d07b52 59 API calls 100008->100013 100012 d07e8c 59 API calls 100009->100012 100010 d047ef 100014 d04801 100010->100014 100017 d081a7 59 API calls 100010->100017 100011 d3d9f4 100015 d07d2c 59 API calls 100011->100015 100012->100004 100016 d047c7 100013->100016 100018 d04811 100014->100018 100020 d081a7 59 API calls 100014->100020 100032 d3d9b1 100015->100032 100016->100006 100023 d079ab 59 API calls 100016->100023 100017->100014 100022 d04818 100018->100022 100024 d081a7 59 API calls 100018->100024 100019->100011 100021 d3d9dd 100019->100021 100031 d3d95b 100019->100031 100020->100018 100021->100011 100027 d3d9c8 100021->100027 100025 d081a7 59 API calls 100022->100025 100034 d0481f Mailbox 100022->100034 100023->100006 100024->100022 100025->100034 100026 d07b52 59 API calls 100026->100032 100030 d07d2c 59 API calls 100027->100030 100028 d3d9b9 100029 d07d2c 59 API calls 100028->100029 100029->100032 100030->100032 100031->100028 100035 d3d9a4 100031->100035 100032->100006 100032->100026 100116 d07a84 59 API calls 2 library calls 100032->100116 100034->99891 100036 d07d2c 59 API calls 100035->100036 100036->100032 100048->99862 100049->99869 100050->99896 100051->99947 100052->99947 100053->99947 100054->99947 100055->99947 100056->99947 100057->99921 100058->99924 100059->99946 100063 d3e181 100062->100063 100064 d05e12 CreateFileW 100062->100064 100065 d05e34 100063->100065 100066 d3e187 CreateFileW 100063->100066 100064->100065 100065->99967 100066->100065 100067 d3e1ad 100066->100067 100068 d05c4e 2 API calls 100067->100068 100069 d3e1b8 100068->100069 100069->100065 100071 d0578b 100070->100071 100072 d3dfce 100070->100072 100073 d05c4e 2 API calls 100071->100073 100086 d0581a 100071->100086 100072->100086 100095 d05e3f 100072->100095 100074 d057ad 100073->100074 100075 d0538e 59 API calls 100074->100075 100077 d057b7 100075->100077 100077->100072 100078 d057c4 100077->100078 100079 d20ff6 Mailbox 59 API calls 100078->100079 100080 d057cf 100079->100080 100081 d0538e 59 API calls 100080->100081 100082 d057da 100081->100082 100089 d05d20 100082->100089 100084 d05807 100085 d05c4e 2 API calls 100084->100085 100085->100086 100086->99970 100087->99972 100088->99975 100090 d05d93 100089->100090 100094 d05d2e 100089->100094 100100 d05dae SetFilePointerEx 100090->100100 100091 d05d56 100091->100084 100093 d05d66 ReadFile 100093->100091 100093->100094 100094->100091 100094->100093 100096 d05c4e 2 API calls 100095->100096 100097 d05e60 100096->100097 100098 d05c4e 2 API calls 100097->100098 100099 d05e74 100098->100099 100099->100086 100100->100094 100101->99984 100102->99983 100104 d07a17 100103->100104 100105 d079ba 100103->100105 100106 d07e8c 59 API calls 100104->100106 100105->100104 100107 d079c5 100105->100107 100113 d079e8 _memmove 100106->100113 100108 d079e0 100107->100108 100109 d3ef32 100107->100109 100117 d08087 59 API calls Mailbox 100108->100117 100118 d08189 100109->100118 100112 d3ef3c 100114 d20ff6 Mailbox 59 API calls 100112->100114 100113->100010 100115 d3ef5c 100114->100115 100116->100032 100117->100113 100119 d20ff6 Mailbox 59 API calls 100118->100119 100120 d08193 100119->100120 100120->100112 100121->98640 100123 d06ef5 100122->100123 100124 d07009 100122->100124 100123->100124 100125 d20ff6 Mailbox 59 API calls 100123->100125 100124->98648 100127 d06f1c 100125->100127 100126 d20ff6 Mailbox 59 API calls 100128 d06f91 100126->100128 100127->100126 100128->100124 100135 d063a0 100128->100135 100160 d074bd 59 API calls Mailbox 100128->100160 100161 d56ac9 59 API calls Mailbox 100128->100161 100162 d0766f 59 API calls 2 library calls 100128->100162 100133->98651 100134->98653 100163 d07b76 100135->100163 100160->100128 100161->100128 100162->100128 100164 d20ff6 Mailbox 59 API calls 100163->100164 100165 d07b9b 100164->100165 100176->98666 100177->98667 100717 d40226 100722 d0ade2 Mailbox 100717->100722 100719 d40c86 100880 d566f4 100719->100880 100721 d40c8f 100722->100719 100722->100721 100723 d09df0 Mailbox 59 API calls 100722->100723 100724 d400e0 VariantClear 100722->100724 100725 d0b6c1 100722->100725 100732 d6d2e6 100722->100732 100779 d12123 100722->100779 100819 d6d2e5 100722->100819 100866 d7474d 100722->100866 100875 d7e237 100722->100875 100878 d57405 59 API calls 100722->100878 100723->100722 100724->100722 100879 d6a0b5 89 API calls 4 library calls 100725->100879 100733 d6d305 100732->100733 100735 d6d310 100732->100735 100734 d09c9c 59 API calls 100733->100734 100734->100735 100737 d077c7 59 API calls 100735->100737 100777 d6d3ea Mailbox 100735->100777 100736 d20ff6 Mailbox 59 API calls 100738 d6d433 100736->100738 100739 d6d334 100737->100739 100740 d6d43f 100738->100740 100884 d05906 60 API calls Mailbox 100738->100884 100742 d077c7 59 API calls 100739->100742 100743 d09997 84 API calls 100740->100743 100744 d6d33d 100742->100744 100745 d6d457 100743->100745 100746 d09997 84 API calls 100744->100746 100747 d05956 67 API calls 100745->100747 100748 d6d349 100746->100748 100749 d6d466 100747->100749 100750 d046f9 59 API calls 100748->100750 100751 d6d49e 100749->100751 100752 d6d46a GetLastError 100749->100752 100753 d6d35e 100750->100753 100756 d6d500 100751->100756 100757 d6d4c9 100751->100757 100754 d6d483 100752->100754 100755 d07c8e 59 API calls 100753->100755 100775 d6d3f3 Mailbox 100754->100775 100885 d05a1a CloseHandle 100754->100885 100758 d6d391 100755->100758 100759 d20ff6 Mailbox 59 API calls 100756->100759 100760 d20ff6 Mailbox 59 API calls 100757->100760 100761 d6d3e3 100758->100761 100766 d63e73 3 API calls 100758->100766 100762 d6d505 100759->100762 100763 d6d4ce 100760->100763 100765 d09c9c 59 API calls 100761->100765 100770 d077c7 59 API calls 100762->100770 100762->100775 100767 d6d4df 100763->100767 100771 d077c7 59 API calls 100763->100771 100765->100777 100768 d6d3a1 100766->100768 100886 d6f835 59 API calls 2 library calls 100767->100886 100768->100761 100769 d6d3a5 100768->100769 100772 d07f41 59 API calls 100769->100772 100770->100775 100771->100767 100774 d6d3b2 100772->100774 100883 d63c66 63 API calls Mailbox 100774->100883 100775->100722 100777->100736 100777->100775 100778 d6d3bb Mailbox 100778->100761 100887 d09bf8 100779->100887 100783 d20ff6 Mailbox 59 API calls 100784 d12154 100783->100784 100787 d12164 100784->100787 100915 d05906 60 API calls Mailbox 100784->100915 100785 d12189 100791 d09c9c 59 API calls 100785->100791 100795 d12196 100785->100795 100786 d469af 100786->100785 100919 d6f7df 59 API calls 100786->100919 100789 d09997 84 API calls 100787->100789 100790 d12172 100789->100790 100792 d05956 67 API calls 100790->100792 100793 d469f7 100791->100793 100794 d12181 100792->100794 100793->100795 100796 d469ff 100793->100796 100794->100785 100794->100786 100918 d05a1a CloseHandle 100794->100918 100797 d05e3f 2 API calls 100795->100797 100798 d09c9c 59 API calls 100796->100798 100800 d1219d 100797->100800 100798->100800 100801 d46a11 100800->100801 100802 d121b7 100800->100802 100803 d20ff6 Mailbox 59 API calls 100801->100803 100804 d077c7 59 API calls 100802->100804 100805 d46a17 100803->100805 100806 d121bf 100804->100806 100807 d46a2b 100805->100807 100920 d059b0 ReadFile SetFilePointerEx 100805->100920 100900 d056d2 100806->100900 100813 d46a2f _memmove 100807->100813 100921 d6794e 59 API calls 2 library calls 100807->100921 100811 d121ce 100811->100813 100916 d09b9c 59 API calls Mailbox 100811->100916 100814 d121e2 Mailbox 100815 d1221c 100814->100815 100816 d05dcf CloseHandle 100814->100816 100815->100722 100817 d12210 100816->100817 100817->100815 100917 d05a1a CloseHandle 100817->100917 100820 d6d310 100819->100820 100821 d6d305 100819->100821 100824 d077c7 59 API calls 100820->100824 100864 d6d3ea Mailbox 100820->100864 100822 d09c9c 59 API calls 100821->100822 100822->100820 100823 d20ff6 Mailbox 59 API calls 100825 d6d433 100823->100825 100826 d6d334 100824->100826 100828 d6d43f 100825->100828 100960 d05906 60 API calls Mailbox 100825->100960 100829 d077c7 59 API calls 100826->100829 100830 d09997 84 API calls 100828->100830 100831 d6d33d 100829->100831 100832 d6d457 100830->100832 100833 d09997 84 API calls 100831->100833 100834 d05956 67 API calls 100832->100834 100835 d6d349 100833->100835 100836 d6d466 100834->100836 100837 d046f9 59 API calls 100835->100837 100838 d6d49e 100836->100838 100839 d6d46a GetLastError 100836->100839 100840 d6d35e 100837->100840 100843 d6d500 100838->100843 100844 d6d4c9 100838->100844 100841 d6d483 100839->100841 100842 d07c8e 59 API calls 100840->100842 100862 d6d3f3 Mailbox 100841->100862 100961 d05a1a CloseHandle 100841->100961 100845 d6d391 100842->100845 100846 d20ff6 Mailbox 59 API calls 100843->100846 100847 d20ff6 Mailbox 59 API calls 100844->100847 100848 d6d3e3 100845->100848 100853 d63e73 3 API calls 100845->100853 100849 d6d505 100846->100849 100850 d6d4ce 100847->100850 100852 d09c9c 59 API calls 100848->100852 100857 d077c7 59 API calls 100849->100857 100849->100862 100854 d6d4df 100850->100854 100858 d077c7 59 API calls 100850->100858 100852->100864 100855 d6d3a1 100853->100855 100962 d6f835 59 API calls 2 library calls 100854->100962 100855->100848 100856 d6d3a5 100855->100856 100859 d07f41 59 API calls 100856->100859 100857->100862 100858->100854 100861 d6d3b2 100859->100861 100959 d63c66 63 API calls Mailbox 100861->100959 100862->100722 100864->100823 100864->100862 100865 d6d3bb Mailbox 100865->100848 100867 d09997 84 API calls 100866->100867 100868 d74787 100867->100868 100869 d063a0 94 API calls 100868->100869 100870 d74797 100869->100870 100871 d747bc 100870->100871 100872 d0a000 341 API calls 100870->100872 100873 d09bf8 59 API calls 100871->100873 100874 d747c0 100871->100874 100872->100871 100873->100874 100874->100722 100876 d7cdf1 130 API calls 100875->100876 100877 d7e247 100876->100877 100877->100722 100878->100722 100879->100719 100963 d56636 100880->100963 100882 d56702 100882->100721 100883->100778 100884->100740 100885->100775 100886->100775 100888 d09c08 100887->100888 100889 d3fbff 100887->100889 100894 d20ff6 Mailbox 59 API calls 100888->100894 100890 d3fc10 100889->100890 100892 d07d2c 59 API calls 100889->100892 100891 d07eec 59 API calls 100890->100891 100893 d3fc1a 100891->100893 100892->100890 100897 d09c34 100893->100897 100898 d077c7 59 API calls 100893->100898 100895 d09c1b 100894->100895 100895->100893 100896 d09c26 100895->100896 100896->100897 100899 d07f41 59 API calls 100896->100899 100897->100783 100897->100786 100898->100897 100899->100897 100901 d05702 100900->100901 100902 d056dd 100900->100902 100903 d07eec 59 API calls 100901->100903 100902->100901 100904 d056ec 100902->100904 100907 d6349a 100903->100907 100924 d05c18 100904->100924 100906 d634c9 100906->100811 100907->100906 100922 d63436 ReadFile SetFilePointerEx 100907->100922 100923 d07a84 59 API calls 2 library calls 100907->100923 100914 d635d8 Mailbox 100914->100811 100915->100787 100916->100814 100917->100815 100918->100786 100919->100786 100920->100807 100921->100813 100922->100907 100923->100907 100925 d20ff6 Mailbox 59 API calls 100924->100925 100926 d05c2b 100925->100926 100927 d20ff6 Mailbox 59 API calls 100926->100927 100928 d05c37 100927->100928 100929 d05632 100928->100929 100936 d05a2f 100929->100936 100931 d05674 100931->100914 100935 d0793a 61 API calls Mailbox 100931->100935 100932 d05d20 2 API calls 100933 d05643 100932->100933 100933->100931 100933->100932 100943 d05bda 100933->100943 100935->100914 100937 d05a40 100936->100937 100938 d3e065 100936->100938 100937->100933 100952 d56443 59 API calls Mailbox 100938->100952 100940 d3e06f 100941 d20ff6 Mailbox 59 API calls 100940->100941 100942 d3e07b 100941->100942 100944 d3e117 100943->100944 100945 d05bee 100943->100945 100958 d56443 59 API calls Mailbox 100944->100958 100953 d05b19 100945->100953 100948 d05bfa 100948->100933 100949 d3e122 100950 d20ff6 Mailbox 59 API calls 100949->100950 100951 d3e137 _memmove 100950->100951 100952->100940 100954 d05b31 100953->100954 100956 d05b2a _memmove 100953->100956 100955 d20ff6 Mailbox 59 API calls 100954->100955 100957 d3e0a7 100954->100957 100955->100956 100956->100948 100957->100957 100958->100949 100959->100865 100960->100828 100961->100862 100962->100862 100964 d5665e 100963->100964 100965 d56641 100963->100965 100964->100882 100965->100964 100967 d56621 59 API calls Mailbox 100965->100967 100967->100965 100968 16829bb 100969 16829c2 100968->100969 100970 16829ca 100969->100970 100971 1682a60 100969->100971 100975 1682670 100970->100975 100988 1683310 9 API calls 100971->100988 100974 1682a47 100989 1680000 100975->100989 100978 1682740 CreateFileW 100979 168270f 100978->100979 100985 168274d 100978->100985 100980 1682769 VirtualAlloc 100979->100980 100979->100985 100986 1682870 FindCloseChangeNotification 100979->100986 100987 1682880 VirtualFree 100979->100987 100992 1683580 GetPEB 100979->100992 100981 168278a ReadFile 100980->100981 100980->100985 100982 16827a8 VirtualAlloc 100981->100982 100981->100985 100982->100979 100982->100985 100983 168296a 100983->100974 100984 168295c VirtualFree 100984->100983 100985->100983 100985->100984 100986->100979 100987->100979 100988->100974 100994 1683520 GetPEB 100989->100994 100991 168068b 100991->100979 100993 16835aa 100992->100993 100993->100978 100995 168354a 100994->100995 100995->100991 100996 d03633 100997 d0366a 100996->100997 100998 d036e7 100997->100998 100999 d03688 100997->100999 101036 d036e5 100997->101036 101003 d036ed 100998->101003 101004 d3d31c 100998->101004 101000 d03695 100999->101000 101001 d0375d PostQuitMessage 100999->101001 101005 d036a0 101000->101005 101006 d3d38f 101000->101006 101037 d036d8 101001->101037 101002 d036ca DefWindowProcW 101002->101037 101008 d036f2 101003->101008 101009 d03715 SetTimer RegisterWindowMessageW 101003->101009 101046 d111d0 10 API calls Mailbox 101004->101046 101010 d03767 101005->101010 101011 d036a8 101005->101011 101050 d62a16 71 API calls _memset 101006->101050 101015 d036f9 KillTimer 101008->101015 101016 d3d2bf 101008->101016 101012 d0373e CreatePopupMenu 101009->101012 101009->101037 101044 d04531 64 API calls _memset 101010->101044 101018 d036b3 101011->101018 101024 d3d374 101011->101024 101012->101037 101014 d3d343 101047 d111f3 341 API calls Mailbox 101014->101047 101041 d044cb Shell_NotifyIconW _memset 101015->101041 101021 d3d2c4 101016->101021 101022 d3d2f8 MoveWindow 101016->101022 101025 d0374b 101018->101025 101026 d036be 101018->101026 101029 d3d2e7 SetFocus 101021->101029 101030 d3d2c8 101021->101030 101022->101037 101023 d0370c 101042 d03114 DeleteObject DestroyWindow Mailbox 101023->101042 101024->101002 101049 d5817e 59 API calls Mailbox 101024->101049 101043 d045df 81 API calls _memset 101025->101043 101026->101002 101048 d044cb Shell_NotifyIconW _memset 101026->101048 101027 d3d3a1 101027->101002 101027->101037 101028 d0375b 101028->101037 101029->101037 101030->101026 101031 d3d2d1 101030->101031 101045 d111d0 10 API calls Mailbox 101031->101045 101036->101002 101039 d3d368 101040 d043db 68 API calls 101039->101040 101040->101036 101041->101023 101042->101037 101043->101028 101044->101028 101045->101037 101046->101014 101047->101026 101048->101039 101049->101036 101050->101027 101051 d01055 101056 d02649 101051->101056 101054 d22f80 __cinit 67 API calls 101055 d01064 101054->101055 101057 d077c7 59 API calls 101056->101057 101058 d026b7 101057->101058 101063 d03582 101058->101063 101061 d02754 101062 d0105a 101061->101062 101066 d03416 59 API calls 2 library calls 101061->101066 101062->101054 101067 d035b0 101063->101067 101066->101061 101068 d035bd 101067->101068 101069 d035a1 101067->101069 101068->101069 101070 d035c4 RegOpenKeyExW 101068->101070 101069->101061 101070->101069 101071 d035de RegQueryValueExW 101070->101071 101072 d03614 RegCloseKey 101071->101072 101073 d035ff 101071->101073 101072->101069 101073->101072 101074 d3ff06 101075 d3ff10 101074->101075 101109 d0ac90 Mailbox _memmove 101074->101109 101173 d08e34 59 API calls Mailbox 101075->101173 101080 d20ff6 59 API calls Mailbox 101101 d0a097 Mailbox 101080->101101 101083 d0b5d5 101085 d081a7 59 API calls 101083->101085 101096 d0a1b7 101085->101096 101086 d4047f 101177 d6a0b5 89 API calls 4 library calls 101086->101177 101087 d0b5da 101182 d6a0b5 89 API calls 4 library calls 101087->101182 101089 d077c7 59 API calls 101089->101101 101091 d07f41 59 API calls 101091->101109 101092 d081a7 59 API calls 101092->101101 101093 d57405 59 API calls 101093->101101 101094 d4048e 101095 d22f80 67 API calls __cinit 101095->101101 101098 d566f4 Mailbox 59 API calls 101098->101096 101099 d40e00 101181 d6a0b5 89 API calls 4 library calls 101099->101181 101101->101080 101101->101083 101101->101086 101101->101087 101101->101089 101101->101092 101101->101093 101101->101095 101101->101096 101101->101099 101103 d0a6ba 101101->101103 101168 d0ca20 341 API calls 2 library calls 101101->101168 101169 d0ba60 60 API calls Mailbox 101101->101169 101102 d7bf80 341 API calls 101102->101109 101180 d6a0b5 89 API calls 4 library calls 101103->101180 101104 d566f4 Mailbox 59 API calls 101104->101109 101105 d0b416 101172 d0f803 341 API calls 101105->101172 101107 d0a000 341 API calls 101107->101109 101108 d40c94 101110 d09df0 Mailbox 59 API calls 101108->101110 101109->101091 101109->101096 101109->101101 101109->101102 101109->101104 101109->101105 101109->101107 101109->101108 101111 d40ca2 101109->101111 101114 d0b37c 101109->101114 101116 d20ff6 59 API calls Mailbox 101109->101116 101120 d0b685 101109->101120 101123 d0ade2 Mailbox 101109->101123 101130 d7c5f4 101109->101130 101162 d67be0 101109->101162 101174 d57405 59 API calls 101109->101174 101175 d7c4a7 85 API calls 2 library calls 101109->101175 101113 d40c86 101110->101113 101179 d6a0b5 89 API calls 4 library calls 101111->101179 101113->101096 101113->101098 101170 d09e9c 60 API calls Mailbox 101114->101170 101116->101109 101117 d0b38d 101171 d09e9c 60 API calls Mailbox 101117->101171 101178 d6a0b5 89 API calls 4 library calls 101120->101178 101122 d09df0 Mailbox 59 API calls 101122->101123 101123->101096 101123->101113 101123->101120 101123->101122 101124 d400e0 VariantClear 101123->101124 101125 d6d2e6 101 API calls 101123->101125 101126 d7e237 130 API calls 101123->101126 101127 d12123 95 API calls 101123->101127 101128 d6d2e5 101 API calls 101123->101128 101129 d7474d 341 API calls 101123->101129 101176 d57405 59 API calls 101123->101176 101124->101123 101125->101123 101126->101123 101127->101123 101128->101123 101129->101123 101131 d077c7 59 API calls 101130->101131 101132 d7c608 101131->101132 101133 d077c7 59 API calls 101132->101133 101134 d7c610 101133->101134 101135 d077c7 59 API calls 101134->101135 101136 d7c618 101135->101136 101137 d09997 84 API calls 101136->101137 101161 d7c626 101137->101161 101138 d07d2c 59 API calls 101138->101161 101139 d07a84 59 API calls 101139->101161 101140 d7c80f 101141 d7c83c Mailbox 101140->101141 101185 d09b9c 59 API calls Mailbox 101140->101185 101141->101109 101143 d7c7f6 101144 d07e0b 59 API calls 101143->101144 101147 d7c803 101144->101147 101145 d7c811 101148 d07e0b 59 API calls 101145->101148 101146 d081a7 59 API calls 101146->101161 101149 d07c8e 59 API calls 101147->101149 101150 d7c820 101148->101150 101149->101140 101153 d07c8e 59 API calls 101150->101153 101151 d07faf 59 API calls 101152 d7c6bd CharUpperBuffW 101151->101152 101183 d0859a 68 API calls 101152->101183 101153->101140 101154 d07faf 59 API calls 101156 d7c77d CharUpperBuffW 101154->101156 101184 d0c707 69 API calls 2 library calls 101156->101184 101158 d09997 84 API calls 101158->101161 101159 d07e0b 59 API calls 101159->101161 101160 d07c8e 59 API calls 101160->101161 101161->101138 101161->101139 101161->101140 101161->101141 101161->101143 101161->101145 101161->101146 101161->101151 101161->101154 101161->101158 101161->101159 101161->101160 101163 d67bec 101162->101163 101164 d20ff6 Mailbox 59 API calls 101163->101164 101165 d67bfa 101164->101165 101166 d67c08 101165->101166 101167 d077c7 59 API calls 101165->101167 101166->101109 101167->101166 101168->101101 101169->101101 101170->101117 101171->101105 101172->101120 101173->101109 101174->101109 101175->101109 101176->101123 101177->101094 101178->101113 101179->101113 101180->101096 101181->101087 101182->101096 101183->101161 101184->101161 101185->101141 101186 d01066 101191 d0f8cf 101186->101191 101188 d0106c 101189 d22f80 __cinit 67 API calls 101188->101189 101190 d01076 101189->101190 101192 d0f8f0 101191->101192 101224 d20143 101192->101224 101196 d0f937 101197 d077c7 59 API calls 101196->101197 101198 d0f941 101197->101198 101199 d077c7 59 API calls 101198->101199 101200 d0f94b 101199->101200 101201 d077c7 59 API calls 101200->101201 101202 d0f955 101201->101202 101203 d077c7 59 API calls 101202->101203 101204 d0f993 101203->101204 101205 d077c7 59 API calls 101204->101205 101206 d0fa5e 101205->101206 101234 d160e7 101206->101234 101210 d0fa90 101211 d077c7 59 API calls 101210->101211 101212 d0fa9a 101211->101212 101262 d1ffde 101212->101262 101214 d0fae1 101215 d0faf1 GetStdHandle 101214->101215 101216 d449d5 101215->101216 101217 d0fb3d 101215->101217 101216->101217 101219 d449de 101216->101219 101218 d0fb45 OleInitialize 101217->101218 101218->101188 101269 d66dda 64 API calls Mailbox 101219->101269 101221 d449e5 101270 d674a9 CreateThread 101221->101270 101223 d449f1 CloseHandle 101223->101218 101271 d2021c 101224->101271 101227 d2021c 59 API calls 101228 d20185 101227->101228 101229 d077c7 59 API calls 101228->101229 101230 d20191 101229->101230 101231 d07d2c 59 API calls 101230->101231 101232 d0f8f6 101231->101232 101233 d203a2 6 API calls 101232->101233 101233->101196 101235 d077c7 59 API calls 101234->101235 101236 d160f7 101235->101236 101237 d077c7 59 API calls 101236->101237 101238 d160ff 101237->101238 101278 d15bfd 101238->101278 101241 d15bfd 59 API calls 101242 d1610f 101241->101242 101243 d077c7 59 API calls 101242->101243 101244 d1611a 101243->101244 101245 d20ff6 Mailbox 59 API calls 101244->101245 101246 d0fa68 101245->101246 101247 d16259 101246->101247 101248 d16267 101247->101248 101249 d077c7 59 API calls 101248->101249 101250 d16272 101249->101250 101251 d077c7 59 API calls 101250->101251 101252 d1627d 101251->101252 101253 d077c7 59 API calls 101252->101253 101254 d16288 101253->101254 101255 d077c7 59 API calls 101254->101255 101256 d16293 101255->101256 101257 d15bfd 59 API calls 101256->101257 101258 d1629e 101257->101258 101259 d20ff6 Mailbox 59 API calls 101258->101259 101260 d162a5 RegisterWindowMessageW 101259->101260 101260->101210 101263 d55cc3 101262->101263 101264 d1ffee 101262->101264 101281 d69d71 60 API calls 101263->101281 101265 d20ff6 Mailbox 59 API calls 101264->101265 101268 d1fff6 101265->101268 101267 d55cce 101268->101214 101269->101221 101270->101223 101282 d6748f 65 API calls 101270->101282 101272 d077c7 59 API calls 101271->101272 101273 d20227 101272->101273 101274 d077c7 59 API calls 101273->101274 101275 d2022f 101274->101275 101276 d077c7 59 API calls 101275->101276 101277 d2017b 101276->101277 101277->101227 101279 d077c7 59 API calls 101278->101279 101280 d15c05 101279->101280 101280->101241 101281->101267 101283 d01016 101288 d04ad2 101283->101288 101286 d22f80 __cinit 67 API calls 101287 d01025 101286->101287 101289 d20ff6 Mailbox 59 API calls 101288->101289 101290 d04ada 101289->101290 101291 d0101b 101290->101291 101295 d04a94 101290->101295 101291->101286 101296 d04aaf 101295->101296 101297 d04a9d 101295->101297 101299 d04afe 101296->101299 101298 d22f80 __cinit 67 API calls 101297->101298 101298->101296 101300 d077c7 59 API calls 101299->101300 101301 d04b16 GetVersionExW 101300->101301 101302 d07d2c 59 API calls 101301->101302 101303 d04b59 101302->101303 101304 d07e8c 59 API calls 101303->101304 101313 d04b86 101303->101313 101305 d04b7a 101304->101305 101306 d07886 59 API calls 101305->101306 101306->101313 101307 d04bf1 GetCurrentProcess IsWow64Process 101308 d04c0a 101307->101308 101310 d04c20 101308->101310 101311 d04c89 GetSystemInfo 101308->101311 101309 d3dc8d 101323 d04c95 101310->101323 101312 d04c56 101311->101312 101312->101291 101313->101307 101313->101309 101316 d04c32 101319 d04c95 2 API calls 101316->101319 101317 d04c7d GetSystemInfo 101318 d04c47 101317->101318 101318->101312 101320 d04c4d FreeLibrary 101318->101320 101321 d04c3a GetNativeSystemInfo 101319->101321 101320->101312 101321->101318 101324 d04c2e 101323->101324 101325 d04c9e LoadLibraryA 101323->101325 101324->101316 101324->101317 101325->101324 101326 d04caf GetProcAddress 101325->101326 101326->101324 101327 1682410 101328 1680000 GetPEB 101327->101328 101329 16824f4 101328->101329 101341 1682300 101329->101341 101342 1682309 Sleep 101341->101342 101343 1682317 101342->101343 101344 d0568a 101345 d05c18 59 API calls 101344->101345 101346 d0569c 101345->101346 101347 d05632 61 API calls 101346->101347 101348 d056aa 101347->101348 101350 d056ba Mailbox 101348->101350 101351 d081c1 61 API calls Mailbox 101348->101351 101351->101350 101352 d0e70b 101355 d0d260 101352->101355 101354 d0e719 101356 d0d27d 101355->101356 101383 d0d4dd 101355->101383 101357 d42b0a 101356->101357 101358 d42abb 101356->101358 101378 d0d2a4 101356->101378 101399 d7a6fb 341 API calls __cinit 101357->101399 101361 d42abe 101358->101361 101366 d42ad9 101358->101366 101362 d42aca 101361->101362 101361->101378 101397 d7ad0f 341 API calls 101362->101397 101363 d22f80 __cinit 67 API calls 101363->101378 101366->101383 101398 d7b1b7 341 API calls 3 library calls 101366->101398 101367 d0d594 101391 d08bb2 68 API calls 101367->101391 101368 d42cdf 101368->101368 101369 d0d6ab 101369->101354 101373 d0d5a3 101373->101354 101374 d42c26 101403 d7aa66 89 API calls 101374->101403 101377 d08620 69 API calls 101377->101378 101378->101363 101378->101367 101378->101369 101378->101374 101378->101377 101378->101383 101386 d0a000 341 API calls 101378->101386 101387 d081a7 59 API calls 101378->101387 101389 d088a0 68 API calls __cinit 101378->101389 101390 d086a2 68 API calls 101378->101390 101392 d0859a 68 API calls 101378->101392 101393 d0d0dc 341 API calls 101378->101393 101394 d09f3a 59 API calls Mailbox 101378->101394 101395 d0d060 89 API calls 101378->101395 101396 d0cedd 341 API calls 101378->101396 101400 d08bb2 68 API calls 101378->101400 101401 d09e9c 60 API calls Mailbox 101378->101401 101402 d56d03 60 API calls 101378->101402 101383->101369 101404 d6a0b5 89 API calls 4 library calls 101383->101404 101386->101378 101387->101378 101389->101378 101390->101378 101391->101373 101392->101378 101393->101378 101394->101378 101395->101378 101396->101378 101397->101369 101398->101383 101399->101378 101400->101378 101401->101378 101402->101378 101403->101383 101404->101368 101405 d0107d 101410 d071eb 101405->101410 101407 d0108c 101408 d22f80 __cinit 67 API calls 101407->101408 101409 d01096 101408->101409 101411 d071fb __ftell_nolock 101410->101411 101412 d077c7 59 API calls 101411->101412 101413 d072b1 101412->101413 101414 d04864 61 API calls 101413->101414 101415 d072ba 101414->101415 101441 d2074f 101415->101441 101418 d07e0b 59 API calls 101419 d072d3 101418->101419 101420 d03f84 59 API calls 101419->101420 101421 d072e2 101420->101421 101422 d077c7 59 API calls 101421->101422 101423 d072eb 101422->101423 101424 d07eec 59 API calls 101423->101424 101425 d072f4 RegOpenKeyExW 101424->101425 101426 d3ecda RegQueryValueExW 101425->101426 101430 d07316 Mailbox 101425->101430 101427 d3ecf7 101426->101427 101428 d3ed6c RegCloseKey 101426->101428 101429 d20ff6 Mailbox 59 API calls 101427->101429 101428->101430 101437 d3ed7e _wcscat Mailbox __wsetenvp 101428->101437 101431 d3ed10 101429->101431 101430->101407 101433 d0538e 59 API calls 101431->101433 101432 d07b52 59 API calls 101432->101437 101434 d3ed1b RegQueryValueExW 101433->101434 101435 d3ed38 101434->101435 101438 d3ed52 101434->101438 101436 d07d2c 59 API calls 101435->101436 101436->101438 101437->101430 101437->101432 101439 d07f41 59 API calls 101437->101439 101440 d03f84 59 API calls 101437->101440 101438->101428 101439->101437 101440->101437 101442 d31b90 __ftell_nolock 101441->101442 101443 d2075c GetFullPathNameW 101442->101443 101444 d2077e 101443->101444 101445 d07d2c 59 API calls 101444->101445 101446 d072c5 101445->101446 101446->101418

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00D03B7A
                                                          • IsDebuggerPresent.KERNEL32 ref: 00D03B8C
                                                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,00DC62F8,00DC62E0,?,?), ref: 00D03BFD
                                                            • Part of subcall function 00D07D2C: _memmove.LIBCMT ref: 00D07D66
                                                            • Part of subcall function 00D10A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00D03C26,00DC62F8,?,?,?), ref: 00D10ACE
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00D03C81
                                                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00DB93F0,00000010), ref: 00D3D4BC
                                                          • SetCurrentDirectoryW.KERNEL32(?,00DC62F8,?,?,?), ref: 00D3D4F4
                                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00DB5D40,00DC62F8,?,?,?), ref: 00D3D57A
                                                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 00D3D581
                                                            • Part of subcall function 00D03A58: GetSysColorBrush.USER32(0000000F), ref: 00D03A62
                                                            • Part of subcall function 00D03A58: LoadCursorW.USER32(00000000,00007F00), ref: 00D03A71
                                                            • Part of subcall function 00D03A58: LoadIconW.USER32(00000063), ref: 00D03A88
                                                            • Part of subcall function 00D03A58: LoadIconW.USER32(000000A4), ref: 00D03A9A
                                                            • Part of subcall function 00D03A58: LoadIconW.USER32(000000A2), ref: 00D03AAC
                                                            • Part of subcall function 00D03A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00D03AD2
                                                            • Part of subcall function 00D03A58: RegisterClassExW.USER32(?), ref: 00D03B28
                                                            • Part of subcall function 00D039E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00D03A15
                                                            • Part of subcall function 00D039E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00D03A36
                                                            • Part of subcall function 00D039E7: ShowWindow.USER32(00000000,?,?), ref: 00D03A4A
                                                            • Part of subcall function 00D039E7: ShowWindow.USER32(00000000,?,?), ref: 00D03A53
                                                            • Part of subcall function 00D043DB: _memset.LIBCMT ref: 00D04401
                                                            • Part of subcall function 00D043DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00D044A6
                                                          Strings
                                                          • runas, xrefs: 00D3D575
                                                          • This is a third-party compiled AutoIt script., xrefs: 00D3D4B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                          • String ID: This is a third-party compiled AutoIt script.$runas
                                                          • API String ID: 529118366-3287110873
                                                          • Opcode ID: b3fd0d4dd53ead23dc3a8d99ac2a057d4521313dc75f03d519a96dc34cf6ae63
                                                          • Instruction ID: 13d91279fbf94ff9e7b376b4da4f6679747ce85151b50faea1b93866181727bd
                                                          • Opcode Fuzzy Hash: b3fd0d4dd53ead23dc3a8d99ac2a057d4521313dc75f03d519a96dc34cf6ae63
                                                          • Instruction Fuzzy Hash: 9951D170E0434AAEDB11ABB4EC05FEDBB79EF05700F044169F459E62E1DA709646CB39
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 996 d04afe-d04b5e call d077c7 GetVersionExW call d07d2c 1001 d04b64 996->1001 1002 d04c69-d04c6b 996->1002 1004 d04b67-d04b6c 1001->1004 1003 d3db90-d3db9c 1002->1003 1005 d3db9d-d3dba1 1003->1005 1006 d04c70-d04c71 1004->1006 1007 d04b72 1004->1007 1009 d3dba3 1005->1009 1010 d3dba4-d3dbb0 1005->1010 1008 d04b73-d04baa call d07e8c call d07886 1006->1008 1007->1008 1018 d04bb0-d04bb1 1008->1018 1019 d3dc8d-d3dc90 1008->1019 1009->1010 1010->1005 1012 d3dbb2-d3dbb7 1010->1012 1012->1004 1014 d3dbbd-d3dbc4 1012->1014 1014->1003 1016 d3dbc6 1014->1016 1020 d3dbcb-d3dbce 1016->1020 1018->1020 1021 d04bb7-d04bc2 1018->1021 1022 d3dc92 1019->1022 1023 d3dca9-d3dcad 1019->1023 1024 d04bf1-d04c08 GetCurrentProcess IsWow64Process 1020->1024 1025 d3dbd4-d3dbf2 1020->1025 1026 d3dc13-d3dc19 1021->1026 1027 d04bc8-d04bca 1021->1027 1028 d3dc95 1022->1028 1030 d3dc98-d3dca1 1023->1030 1031 d3dcaf-d3dcb8 1023->1031 1032 d04c0a 1024->1032 1033 d04c0d-d04c1e 1024->1033 1025->1024 1029 d3dbf8-d3dbfe 1025->1029 1038 d3dc23-d3dc29 1026->1038 1039 d3dc1b-d3dc1e 1026->1039 1034 d04bd0-d04bd3 1027->1034 1035 d3dc2e-d3dc3a 1027->1035 1028->1030 1036 d3dc00-d3dc03 1029->1036 1037 d3dc08-d3dc0e 1029->1037 1030->1023 1031->1028 1040 d3dcba-d3dcbd 1031->1040 1032->1033 1041 d04c20-d04c30 call d04c95 1033->1041 1042 d04c89-d04c93 GetSystemInfo 1033->1042 1043 d3dc5a-d3dc5d 1034->1043 1044 d04bd9-d04be8 1034->1044 1046 d3dc44-d3dc4a 1035->1046 1047 d3dc3c-d3dc3f 1035->1047 1036->1024 1037->1024 1038->1024 1039->1024 1040->1030 1053 d04c32-d04c3f call d04c95 1041->1053 1054 d04c7d-d04c87 GetSystemInfo 1041->1054 1045 d04c56-d04c66 1042->1045 1043->1024 1052 d3dc63-d3dc78 1043->1052 1049 d3dc4f-d3dc55 1044->1049 1050 d04bee 1044->1050 1046->1024 1047->1024 1049->1024 1050->1024 1055 d3dc82-d3dc88 1052->1055 1056 d3dc7a-d3dc7d 1052->1056 1061 d04c41-d04c45 GetNativeSystemInfo 1053->1061 1062 d04c76-d04c7b 1053->1062 1057 d04c47-d04c4b 1054->1057 1055->1024 1056->1024 1057->1045 1059 d04c4d-d04c50 FreeLibrary 1057->1059 1059->1045 1061->1057 1062->1061
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 00D04B2B
                                                            • Part of subcall function 00D07D2C: _memmove.LIBCMT ref: 00D07D66
                                                          • GetCurrentProcess.KERNEL32(?,00D8FAEC,00000000,00000000,?), ref: 00D04BF8
                                                          • IsWow64Process.KERNEL32(00000000), ref: 00D04BFF
                                                          • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00D04C45
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00D04C50
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 00D04C81
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 00D04C8D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                          • String ID:
                                                          • API String ID: 1986165174-0
                                                          • Opcode ID: 60399f1f8079ab3489594e935418152b3912dcd9568d79799b00f9085ec69524
                                                          • Instruction ID: 355dff5c552fc60060e8d56234adb8d97945c1e67f72f4fe832155cfb3836899
                                                          • Opcode Fuzzy Hash: 60399f1f8079ab3489594e935418152b3912dcd9568d79799b00f9085ec69524
                                                          • Instruction Fuzzy Hash: 3991C37194A7C0DEC731CB6894516AAFFE5AF29300F48499ED1CF93A81D230E948CB39
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1063 d04fe9-d05001 CreateStreamOnHGlobal 1064 d05021-d05026 1063->1064 1065 d05003-d0501a FindResourceExW 1063->1065 1066 d05020 1065->1066 1067 d3dd5c-d3dd6b LoadResource 1065->1067 1066->1064 1067->1066 1068 d3dd71-d3dd7f SizeofResource 1067->1068 1068->1066 1069 d3dd85-d3dd90 LockResource 1068->1069 1069->1066 1070 d3dd96-d3dd9e 1069->1070 1071 d3dda2-d3ddb4 1070->1071 1071->1066
                                                          APIs
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00D04EEE,?,?,00000000,00000000), ref: 00D04FF9
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00D04EEE,?,?,00000000,00000000), ref: 00D05010
                                                          • LoadResource.KERNEL32(?,00000000,?,?,00D04EEE,?,?,00000000,00000000,?,?,?,?,?,?,00D04F8F), ref: 00D3DD60
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,00D04EEE,?,?,00000000,00000000,?,?,?,?,?,?,00D04F8F), ref: 00D3DD75
                                                          • LockResource.KERNEL32(00D04EEE,?,?,00D04EEE,?,?,00000000,00000000,?,?,?,?,?,?,00D04F8F,00000000), ref: 00D3DD88
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 0e7bac173bc07f8fffc747c85b1ac2bb1f9cd9a620292dc132861af1b7651ffd
                                                          • Instruction ID: f3858daadbe30ba49d9d10de77b0ab66e5f76e80545dd9e06b901f12ec004dd0
                                                          • Opcode Fuzzy Hash: 0e7bac173bc07f8fffc747c85b1ac2bb1f9cd9a620292dc132861af1b7651ffd
                                                          • Instruction Fuzzy Hash: 97112E75240701AFD7218B65EC58F6B7BB9EBC9B51F244568F809D62A0DB61E8008A70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(?,00D3E7C1), ref: 00D646A6
                                                          • FindFirstFileW.KERNELBASE(?,?), ref: 00D646B7
                                                          • FindClose.KERNEL32(00000000), ref: 00D646C7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirst
                                                          • String ID:
                                                          • API String ID: 48322524-0
                                                          • Opcode ID: d878573a699a8a459aa428097767b72c04551958cf31e3231822e295b0521e54
                                                          • Instruction ID: 8903e254b9f38c938c9463622bbf5d87c9bb6f1462b20e9d247a6103397c3151
                                                          • Opcode Fuzzy Hash: d878573a699a8a459aa428097767b72c04551958cf31e3231822e295b0521e54
                                                          • Instruction Fuzzy Hash: 4CE026328206006B8210A778EC4D8EA7B9CDE46335F100726F835C26E0EBB09D6487FA
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          • Variable must be of type 'Object'., xrefs: 00D4428C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable must be of type 'Object'.
                                                          • API String ID: 0-109567571
                                                          • Opcode ID: 2c20e6590e2060cfeb5134f9bfb27a7e8ffbf5855ffb739585acea1ab81ace9e
                                                          • Instruction ID: 53b18f64a58fb1844d0505324d4abb65c57688bea805f4469d36369b63a76a4f
                                                          • Opcode Fuzzy Hash: 2c20e6590e2060cfeb5134f9bfb27a7e8ffbf5855ffb739585acea1ab81ace9e
                                                          • Instruction Fuzzy Hash: 80A25B75A04216CBCB24CF58C480BADB7B1FF58310F288459E95AAB391D775ED82CBB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D10BBB
                                                          • timeGetTime.WINMM ref: 00D10E76
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D10FB3
                                                          • TranslateMessage.USER32(?), ref: 00D10FC7
                                                          • DispatchMessageW.USER32(?), ref: 00D10FD5
                                                          • Sleep.KERNEL32(0000000A), ref: 00D10FDF
                                                          • LockWindowUpdate.USER32(00000000,?,?), ref: 00D1105A
                                                          • DestroyWindow.USER32 ref: 00D11066
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D11080
                                                          • Sleep.KERNEL32(0000000A,?,?), ref: 00D452AD
                                                          • TranslateMessage.USER32(?), ref: 00D4608A
                                                          • DispatchMessageW.USER32(?), ref: 00D46098
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D460AC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                                                          • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                          • API String ID: 4003667617-3242690629
                                                          • Opcode ID: 3b1e31648d398dc4d4c68b74010327ea57b0bf26c59fbfb36b0ee855a5819db8
                                                          • Instruction ID: d6a3c616f54c3f4f5b2016ba4a65c55e15a79b942488d91dd01c7bf75a9bb8bf
                                                          • Opcode Fuzzy Hash: 3b1e31648d398dc4d4c68b74010327ea57b0bf26c59fbfb36b0ee855a5819db8
                                                          • Instruction Fuzzy Hash: 85B28F70608741DBD724DF24D885BAABBE5FF84304F18491DF58A97292DB71E884CBB2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00D691E9: __time64.LIBCMT ref: 00D691F3
                                                            • Part of subcall function 00D05045: _fseek.LIBCMT ref: 00D0505D
                                                          • __wsplitpath.LIBCMT ref: 00D694BE
                                                            • Part of subcall function 00D2432E: __wsplitpath_helper.LIBCMT ref: 00D2436E
                                                          • _wcscpy.LIBCMT ref: 00D694D1
                                                          • _wcscat.LIBCMT ref: 00D694E4
                                                          • __wsplitpath.LIBCMT ref: 00D69509
                                                          • _wcscat.LIBCMT ref: 00D6951F
                                                          • _wcscat.LIBCMT ref: 00D69532
                                                            • Part of subcall function 00D6922F: _memmove.LIBCMT ref: 00D69268
                                                            • Part of subcall function 00D6922F: _memmove.LIBCMT ref: 00D69277
                                                          • _wcscmp.LIBCMT ref: 00D69479
                                                            • Part of subcall function 00D699BE: _wcscmp.LIBCMT ref: 00D69AAE
                                                            • Part of subcall function 00D699BE: _wcscmp.LIBCMT ref: 00D69AC1
                                                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00D696DC
                                                          • _wcsncpy.LIBCMT ref: 00D6974F
                                                          • DeleteFileW.KERNEL32(?,?), ref: 00D69785
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00D6979B
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D697AC
                                                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D697BE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                          • String ID:
                                                          • API String ID: 1500180987-0
                                                          • Opcode ID: a7036f05721aa49feb64d493b9644cb3ef46ca0ca32c8803df5bc9a26edcbd5d
                                                          • Instruction ID: 03351378e7113bb58531882e6a55db91dc9977db760ba7ca5bd5def5cb918215
                                                          • Opcode Fuzzy Hash: a7036f05721aa49feb64d493b9644cb3ef46ca0ca32c8803df5bc9a26edcbd5d
                                                          • Instruction Fuzzy Hash: 06C129B1900229ABCF21DF95DC95AEEB7BDEF55310F0040AAF609E7251DB309A848F75
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00D03074
                                                          • RegisterClassExW.USER32(00000030), ref: 00D0309E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00D030AF
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00D030CC
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00D030DC
                                                          • LoadIconW.USER32(000000A9), ref: 00D030F2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00D03101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: e92416ca26dd357a2b2b03380189edd239c04433efab6a821c54e69e65bc0fa3
                                                          • Instruction ID: 9f27646a7814527662fdcd77866a4afb3480012a19066ba9de55dcedea39438c
                                                          • Opcode Fuzzy Hash: e92416ca26dd357a2b2b03380189edd239c04433efab6a821c54e69e65bc0fa3
                                                          • Instruction Fuzzy Hash: CD3145B185530AAFEB009FA4DC85AC9BBF0FF09310F20456AE580E63A0E3B54545CF61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00D03074
                                                          • RegisterClassExW.USER32(00000030), ref: 00D0309E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00D030AF
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00D030CC
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00D030DC
                                                          • LoadIconW.USER32(000000A9), ref: 00D030F2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00D03101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: bd60187bbeb81ec43b991598d89b9a83322da56a78d09d7c37616d0595e744ea
                                                          • Instruction ID: 35e62be5baed0e64954703253321f156d23640918d306030c1f38e00de995b4e
                                                          • Opcode Fuzzy Hash: bd60187bbeb81ec43b991598d89b9a83322da56a78d09d7c37616d0595e744ea
                                                          • Instruction Fuzzy Hash: 8721B2B191131AAFEB00DFA4EC89B9DBBF4FB08710F10452AF911E63A0D7B185448FA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00D04864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00DC62F8,?,00D037C0,?), ref: 00D04882
                                                            • Part of subcall function 00D2074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00D072C5), ref: 00D20771
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00D07308
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00D3ECF1
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00D3ED32
                                                          • RegCloseKey.ADVAPI32(?), ref: 00D3ED70
                                                          • _wcscat.LIBCMT ref: 00D3EDC9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 2673923337-2727554177
                                                          • Opcode ID: 54ad6aa8b71f03654a9fcbf197e0f744604b72a308a3fbc7fd68077514ead686
                                                          • Instruction ID: fdf074494fabb8459db2aa093816869a9f3dea1110ac4fa978f0637119dee7fd
                                                          • Opcode Fuzzy Hash: 54ad6aa8b71f03654a9fcbf197e0f744604b72a308a3fbc7fd68077514ead686
                                                          • Instruction Fuzzy Hash: 94713871509302AEC714EF25E881AABFBA8FF58350F44452EF459C72A0EB309949CF75
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00D03A62
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00D03A71
                                                          • LoadIconW.USER32(00000063), ref: 00D03A88
                                                          • LoadIconW.USER32(000000A4), ref: 00D03A9A
                                                          • LoadIconW.USER32(000000A2), ref: 00D03AAC
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00D03AD2
                                                          • RegisterClassExW.USER32(?), ref: 00D03B28
                                                            • Part of subcall function 00D03041: GetSysColorBrush.USER32(0000000F), ref: 00D03074
                                                            • Part of subcall function 00D03041: RegisterClassExW.USER32(00000030), ref: 00D0309E
                                                            • Part of subcall function 00D03041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00D030AF
                                                            • Part of subcall function 00D03041: InitCommonControlsEx.COMCTL32(?), ref: 00D030CC
                                                            • Part of subcall function 00D03041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00D030DC
                                                            • Part of subcall function 00D03041: LoadIconW.USER32(000000A9), ref: 00D030F2
                                                            • Part of subcall function 00D03041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00D03101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: f2083a3f42b0b82af109379108a019725ae4697754e57ab7db431a3d29187b43
                                                          • Instruction ID: dbc6637d4d184a3eda6c1a8cab3be86fc788ed8d388a95fe09502e32c45807a9
                                                          • Opcode Fuzzy Hash: f2083a3f42b0b82af109379108a019725ae4697754e57ab7db431a3d29187b43
                                                          • Instruction Fuzzy Hash: F9211971910306AFEF109FA4EC09F9DBBB5EB08711F10412AE504E63A0D3B696548FA8
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 767 d03633-d03681 769 d036e1-d036e3 767->769 770 d03683-d03686 767->770 769->770 773 d036e5 769->773 771 d036e7 770->771 772 d03688-d0368f 770->772 777 d036ed-d036f0 771->777 778 d3d31c-d3d34a call d111d0 call d111f3 771->778 774 d03695-d0369a 772->774 775 d0375d-d03765 PostQuitMessage 772->775 776 d036ca-d036d2 DefWindowProcW 773->776 779 d036a0-d036a2 774->779 780 d3d38f-d3d3a3 call d62a16 774->780 783 d03711-d03713 775->783 782 d036d8-d036de 776->782 784 d036f2-d036f3 777->784 785 d03715-d0373c SetTimer RegisterWindowMessageW 777->785 814 d3d34f-d3d356 778->814 786 d03767-d03776 call d04531 779->786 787 d036a8-d036ad 779->787 780->783 805 d3d3a9 780->805 783->782 791 d036f9-d0370c KillTimer call d044cb call d03114 784->791 792 d3d2bf-d3d2c2 784->792 785->783 788 d0373e-d03749 CreatePopupMenu 785->788 786->783 794 d036b3-d036b8 787->794 795 d3d374-d3d37b 787->795 788->783 791->783 799 d3d2c4-d3d2c6 792->799 800 d3d2f8-d3d317 MoveWindow 792->800 803 d0374b-d0375b call d045df 794->803 804 d036be-d036c4 794->804 795->776 802 d3d381-d3d38a call d5817e 795->802 808 d3d2e7-d3d2f3 SetFocus 799->808 809 d3d2c8-d3d2cb 799->809 800->783 802->776 803->783 804->776 804->814 805->776 808->783 809->804 810 d3d2d1-d3d2e2 call d111d0 809->810 810->783 814->776 818 d3d35c-d3d36f call d044cb call d043db 814->818 818->776
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?), ref: 00D036D2
                                                          • KillTimer.USER32(?,00000001), ref: 00D036FC
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00D0371F
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00D0372A
                                                          • CreatePopupMenu.USER32 ref: 00D0373E
                                                          • PostQuitMessage.USER32(00000000), ref: 00D0375F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: 953d9a05e7ad52b0705bf9f191276d44d96eee64d7dbab806e6e5b211b333eff
                                                          • Instruction ID: 7fb51f69451588a4bdc1dc550897df5dd96dddf56e5adea9b9785640b5543a35
                                                          • Opcode Fuzzy Hash: 953d9a05e7ad52b0705bf9f191276d44d96eee64d7dbab806e6e5b211b333eff
                                                          • Instruction Fuzzy Hash: 594115B2214207BBDB146F68EC09F7A375DEB44300F580129FA4AD73E1CAA2EE519775
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                                          • API String ID: 1825951767-3513169116
                                                          • Opcode ID: 2e7b387cda6894cf8efca2cd328fcb6606a833ce1d88afcc7294254b7296dc2b
                                                          • Instruction ID: 0254d1461907ff7cf84ce17f184151ec0e04ae6a7e4934026d36958d21087593
                                                          • Opcode Fuzzy Hash: 2e7b387cda6894cf8efca2cd328fcb6606a833ce1d88afcc7294254b7296dc2b
                                                          • Instruction Fuzzy Hash: D1A12B7291022A9ACB04EBA4DC91FEEB77CFF14300F54052AF55AA71D1DB75AA09CB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 942 1682670-168271e call 1680000 945 1682725-168274b call 1683580 CreateFileW 942->945 948 168274d 945->948 949 1682752-1682762 945->949 950 168289d-16828a1 948->950 957 1682769-1682783 VirtualAlloc 949->957 958 1682764 949->958 951 16828e3-16828e6 950->951 952 16828a3-16828a7 950->952 954 16828e9-16828f0 951->954 955 16828a9-16828ac 952->955 956 16828b3-16828b7 952->956 959 16828f2-16828fd 954->959 960 1682945-168295a 954->960 955->956 961 16828b9-16828c3 956->961 962 16828c7-16828cb 956->962 963 168278a-16827a1 ReadFile 957->963 964 1682785 957->964 958->950 967 16828ff 959->967 968 1682901-168290d 959->968 969 168296a-1682972 960->969 970 168295c-1682967 VirtualFree 960->970 961->962 971 16828db 962->971 972 16828cd-16828d7 962->972 965 16827a8-16827e8 VirtualAlloc 963->965 966 16827a3 963->966 964->950 973 16827ea 965->973 974 16827ef-168280a call 16837d0 965->974 966->950 967->960 975 168290f-168291f 968->975 976 1682921-168292d 968->976 970->969 971->951 972->971 973->950 982 1682815-168281f 974->982 978 1682943 975->978 979 168293a-1682940 976->979 980 168292f-1682938 976->980 978->954 979->978 980->978 983 1682821-1682850 call 16837d0 982->983 984 1682852-1682866 call 16835e0 982->984 983->982 990 1682868 984->990 991 168286a-168286e 984->991 990->950 992 168287a-168287e 991->992 993 1682870-1682874 FindCloseChangeNotification 991->993 994 168288e-1682897 992->994 995 1682880-168288b VirtualFree 992->995 993->992 994->945 994->950 995->994
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01682741
                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01682967
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689593066.0000000001680000.00000040.00001000.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1680000_tems.jbxd
                                                          Similarity
                                                          • API ID: CreateFileFreeVirtual
                                                          • String ID:
                                                          • API String ID: 204039940-0
                                                          • Opcode ID: 40a228ae330d8c6dccb3fb1644613726de4fc0fd5d5ec17983852815de9b42d5
                                                          • Instruction ID: f04d79bf57f9f6a8151601f9ecd569abb0f3a8bc31fff42844d8e75cf4bead8e
                                                          • Opcode Fuzzy Hash: 40a228ae330d8c6dccb3fb1644613726de4fc0fd5d5ec17983852815de9b42d5
                                                          • Instruction Fuzzy Hash: E4A10674E00209EBDF14EFA4C894BAEBBB5BF48304F20825DE615BB281D7759A45CF94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1073 d039e7-d03a57 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00D03A15
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00D03A36
                                                          • ShowWindow.USER32(00000000,?,?), ref: 00D03A4A
                                                          • ShowWindow.USER32(00000000,?,?), ref: 00D03A53
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: 63700c7057d4dc8055f22fa1bad1977510a066933fa7a1050c536404dfd5bcb6
                                                          • Instruction ID: de9c0a99f97a3f91a265d6a878938b19dc16a03eb88bdb236ff8d264159a0118
                                                          • Opcode Fuzzy Hash: 63700c7057d4dc8055f22fa1bad1977510a066933fa7a1050c536404dfd5bcb6
                                                          • Instruction Fuzzy Hash: 7BF03A706003927EEA301723AC48E277E7DD7C6F50B10002AB900E2371C2B54841CAB8
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1074 1682410-168256a call 1680000 call 1682300 CreateFileW 1081 168256c 1074->1081 1082 1682571-1682581 1074->1082 1083 1682621-1682626 1081->1083 1085 1682588-16825a2 VirtualAlloc 1082->1085 1086 1682583 1082->1086 1087 16825a4 1085->1087 1088 16825a6-16825bd ReadFile 1085->1088 1086->1083 1087->1083 1089 16825bf 1088->1089 1090 16825c1-16825fb call 1682340 call 1681300 1088->1090 1089->1083 1095 16825fd-1682612 call 1682390 1090->1095 1096 1682617-168261f ExitProcess 1090->1096 1095->1096 1096->1083
                                                          APIs
                                                            • Part of subcall function 01682300: Sleep.KERNELBASE(000001F4), ref: 01682311
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01682560
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689593066.0000000001680000.00000040.00001000.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1680000_tems.jbxd
                                                          Similarity
                                                          • API ID: CreateFileSleep
                                                          • String ID: 2RTR02HIA9L0U8CRO2VWO
                                                          • API String ID: 2694422964-424188522
                                                          • Opcode ID: 0002e114cfe7ed8f08db4d2d27434643dc15e91d6ebd875578280540312a63de
                                                          • Instruction ID: 94ea5ce83e5de65174645b2f1c408919cf7cf973724d7ed7cc4955c1eaa06f63
                                                          • Opcode Fuzzy Hash: 0002e114cfe7ed8f08db4d2d27434643dc15e91d6ebd875578280540312a63de
                                                          • Instruction Fuzzy Hash: A3618E30D04248DBEF11DBA4C854BEEBB75AF19304F00459DE249BB2C1D6BA1B85CBA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1098 d0410d-d04123 1099 d04200-d04204 1098->1099 1100 d04129-d0413e call d07b76 1098->1100 1103 d04144-d04164 call d07d2c 1100->1103 1104 d3d5dd-d3d5ec LoadStringW 1100->1104 1107 d3d5f7-d3d60f call d07c8e call d07143 1103->1107 1108 d0416a-d0416e 1103->1108 1104->1107 1117 d0417e-d041fb call d23020 call d0463e call d22ffc Shell_NotifyIconW call d05a64 1107->1117 1120 d3d615-d3d633 call d07e0b call d07143 call d07e0b 1107->1120 1110 d04174-d04179 call d07c8e 1108->1110 1111 d04205-d0420e call d081a7 1108->1111 1110->1117 1111->1117 1117->1099 1120->1117
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00D3D5EC
                                                            • Part of subcall function 00D07D2C: _memmove.LIBCMT ref: 00D07D66
                                                          • _memset.LIBCMT ref: 00D0418D
                                                          • _wcscpy.LIBCMT ref: 00D041E1
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00D041F1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                          • String ID: Line:
                                                          • API String ID: 3942752672-1585850449
                                                          • Opcode ID: 1207a18636df91c0f956c7ef40f11bf3d463341475b5dc413e24ef4d2cfce687
                                                          • Instruction ID: 32353ef8d4fd6cde9acd64862ef6bb2585b2d2cabf23fd672b7f13ca5f695eca
                                                          • Opcode Fuzzy Hash: 1207a18636df91c0f956c7ef40f11bf3d463341475b5dc413e24ef4d2cfce687
                                                          • Instruction Fuzzy Hash: DB31C171508306AAD721EB60DC46FDFB7E8EF54300F10461EB189961E1EB70A648CBB7
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1133 d2564d-d25666 1134 d25683 1133->1134 1135 d25668-d2566d 1133->1135 1136 d25685-d2568b 1134->1136 1135->1134 1137 d2566f-d25671 1135->1137 1138 d25673-d25678 call d28d68 1137->1138 1139 d2568c-d25691 1137->1139 1147 d2567e call d28ff6 1138->1147 1141 d25693-d2569d 1139->1141 1142 d2569f-d256a3 1139->1142 1141->1142 1144 d256c3-d256d2 1141->1144 1145 d256b3-d256b5 1142->1145 1146 d256a5-d256b0 call d23020 1142->1146 1150 d256d4-d256d7 1144->1150 1151 d256d9 1144->1151 1145->1138 1149 d256b7-d256c1 1145->1149 1146->1145 1147->1134 1149->1138 1149->1144 1152 d256de-d256e3 1150->1152 1151->1152 1155 d256e9-d256f0 1152->1155 1156 d257cc-d257cf 1152->1156 1157 d256f2-d256fa 1155->1157 1158 d25731-d25733 1155->1158 1156->1136 1157->1158 1159 d256fc 1157->1159 1160 d25735-d25737 1158->1160 1161 d2579d-d2579e call d30df7 1158->1161 1162 d25702-d25704 1159->1162 1163 d257fa 1159->1163 1164 d2575b-d25766 1160->1164 1165 d25739-d25741 1160->1165 1174 d257a3-d257a7 1161->1174 1169 d25706-d25708 1162->1169 1170 d2570b-d25710 1162->1170 1171 d257fe-d25807 1163->1171 1167 d2576a-d2576d 1164->1167 1168 d25768 1164->1168 1172 d25743-d2574f 1165->1172 1173 d25751-d25755 1165->1173 1176 d257d4-d257d8 1167->1176 1177 d2576f-d2577b call d24916 call d310ab 1167->1177 1168->1167 1169->1170 1170->1176 1178 d25716-d2572f call d30f18 1170->1178 1171->1136 1175 d25757-d25759 1172->1175 1173->1175 1174->1171 1179 d257a9-d257ae 1174->1179 1175->1167 1181 d257ea-d257f5 call d28d68 1176->1181 1182 d257da-d257e7 call d23020 1176->1182 1194 d25780-d25785 1177->1194 1193 d25792-d2579b 1178->1193 1179->1176 1180 d257b0-d257c1 1179->1180 1185 d257c4-d257c6 1180->1185 1181->1147 1182->1181 1185->1155 1185->1156 1193->1185 1195 d2578b-d2578e 1194->1195 1196 d2580c-d25810 1194->1196 1195->1163 1197 d25790 1195->1197 1196->1171 1197->1193
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                          • String ID:
                                                          • API String ID: 1559183368-0
                                                          • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                                          • Instruction ID: c2102f9991d268fa8b3e76261ef7e84b486882ea5b0ade162f5c4b44446fca6d
                                                          • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                                          • Instruction Fuzzy Hash: DA51B730A00B25DBDB248F69F884E6E77A1EF60329F288729F825971D8D7709D548B70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D04F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00DC62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00D04F6F
                                                          • _free.LIBCMT ref: 00D3E68C
                                                          • _free.LIBCMT ref: 00D3E6D3
                                                            • Part of subcall function 00D06BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00D06D0D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _free$CurrentDirectoryLibraryLoad
                                                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                          • API String ID: 2861923089-1757145024
                                                          • Opcode ID: d94c63f2cc9a9557f3189e78698bad4e919112d3ae367e415db80c29b41e15b7
                                                          • Instruction ID: 2844d89e97229864d339d2b4abadcbc7aede82c1b12029ccf68f1eb5fe84bdb6
                                                          • Opcode Fuzzy Hash: d94c63f2cc9a9557f3189e78698bad4e919112d3ae367e415db80c29b41e15b7
                                                          • Instruction Fuzzy Hash: A9911871910219AFCF04EFA4D891AEDBBB4FF19314F14446AE816AB2D1EB30A915CB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00D035A1,SwapMouseButtons,00000004,?), ref: 00D035D4
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00D035A1,SwapMouseButtons,00000004,?,?,?,?,00D02754), ref: 00D035F5
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,00D035A1,SwapMouseButtons,00000004,?,?,?,?,00D02754), ref: 00D03617
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: f07f8f617ccb2142ca5a9d9de81aeaab773508ff883cf0b619df1082929c6042
                                                          • Instruction ID: 333a9b3d03525c072871ad61b5a0e6277f35ec69a48cf6f67ee612a8178e94ce
                                                          • Opcode Fuzzy Hash: f07f8f617ccb2142ca5a9d9de81aeaab773508ff883cf0b619df1082929c6042
                                                          • Instruction Fuzzy Hash: FE115771610208BFDB208F64DC80EAEBBBCEF04740F548469F809D7250E6729F40ABB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 01681B2D
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01681B51
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01681B73
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689593066.0000000001680000.00000040.00001000.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1680000_tems.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                                                          • Instruction ID: 7d552b5aa3731c9da89ae913556bcb065f85a28a20e034f68c1895936b2ec2a0
                                                          • Opcode Fuzzy Hash: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                                                          • Instruction Fuzzy Hash: D262F830A142589BEB24DFA4CC54BDEB772EF58300F1091A9D20DEB394E7799E81CB59
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                          • String ID:
                                                          • API String ID: 2782032738-0
                                                          • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                                          • Instruction ID: 4e96cb8f981096b85d113535959d89ce14a153ab137851d901db043771b2adec
                                                          • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                                          • Instruction Fuzzy Hash: C641E5706006259BDF28CEA9E8809AF77A6EFA436CB28813DEC55C7640D771DD808B74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D3EE62
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 00D3EEAC
                                                            • Part of subcall function 00D048AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D048A1,?,?,00D037C0,?), ref: 00D048CE
                                                            • Part of subcall function 00D209D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00D209F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen_memset
                                                          • String ID: X
                                                          • API String ID: 3777226403-3081909835
                                                          • Opcode ID: 707e15be6dcc343b169911c1e835b209eac6a61da0910959b3733d6f7dd84aa7
                                                          • Instruction ID: 496df17023088ee4c951ff90c2a7c693d810b2af439bcd8a5724545241946a7f
                                                          • Opcode Fuzzy Hash: 707e15be6dcc343b169911c1e835b209eac6a61da0910959b3733d6f7dd84aa7
                                                          • Instruction Fuzzy Hash: 9D21C371A142989BCB01DF94C845BEEBBF8DF49314F04405AE509EB381DBB4998A8FB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock_memmove
                                                          • String ID: EA06
                                                          • API String ID: 1988441806-3962188686
                                                          • Opcode ID: c5ac07cb9c53d99f62055807a9ab26672c8859dec312dccd53129f524954f27f
                                                          • Instruction ID: 0266b0e4f3a4e30544ca27c248850a40f8480b716b105590e54b40204b220f77
                                                          • Opcode Fuzzy Hash: c5ac07cb9c53d99f62055807a9ab26672c8859dec312dccd53129f524954f27f
                                                          • Instruction Fuzzy Hash: 7D01B971904268AEDB28C6A8D856EFEBBFCDB15315F00419AF552D2181E5B5E6088B70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 00D69B82
                                                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00D69B99
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: 981793002edcc9d83df127b9773feeb24af879e0478655bc20ce295ad157783f
                                                          • Instruction ID: 76b942a4701497b4b1987c00ac661ea1036cde1516d355690d243d2da0be0f8b
                                                          • Opcode Fuzzy Hash: 981793002edcc9d83df127b9773feeb24af879e0478655bc20ce295ad157783f
                                                          • Instruction Fuzzy Hash: 32D05E7994030DABDB509B94DC4EFDA772CE704704F0046A1BE58D11A1DEB155988BA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f27cfb8617ef28356a21dd9c417aa2015e89caaaefcf3b983e2eaf2525498314
                                                          • Instruction ID: 844188dc1ee744d5d6f020743d93292b688aa980fd26fe891b1731ba027aeba8
                                                          • Opcode Fuzzy Hash: f27cfb8617ef28356a21dd9c417aa2015e89caaaefcf3b983e2eaf2525498314
                                                          • Instruction Fuzzy Hash: 58F119716083019FC714DF28C484A6ABBE5FF88314F54892DF8999B352E771E946CFA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D203A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00D203D3
                                                            • Part of subcall function 00D203A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00D203DB
                                                            • Part of subcall function 00D203A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00D203E6
                                                            • Part of subcall function 00D203A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00D203F1
                                                            • Part of subcall function 00D203A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00D203F9
                                                            • Part of subcall function 00D203A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00D20401
                                                            • Part of subcall function 00D16259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00D0FA90), ref: 00D162B4
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00D0FB2D
                                                          • OleInitialize.OLE32(00000000), ref: 00D0FBAA
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D449F2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID:
                                                          • API String ID: 1986988660-0
                                                          • Opcode ID: 4fad58cf47f96d4261ef1d0a891965ac801e80a130bf2a5f196cef4bc75d1b6d
                                                          • Instruction ID: f91761f007aa6cdc4ccb6284c644993ba1724a30b6e773e172c28e7ef8915d15
                                                          • Opcode Fuzzy Hash: 4fad58cf47f96d4261ef1d0a891965ac801e80a130bf2a5f196cef4bc75d1b6d
                                                          • Instruction Fuzzy Hash: 0E8194B090C3839EC788EF69E954E157AE4EB98708324892EE019C73A6EB75C405CF31
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D04401
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00D044A6
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00D044C3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$_memset
                                                          • String ID:
                                                          • API String ID: 1505330794-0
                                                          • Opcode ID: 11fff8d2de1bad746f91315b0226ba8e23e15a5c54a8124524942481a8a7a738
                                                          • Instruction ID: 01fe4a37506e38c4e6f66d54ea7c23bdbf1991cbd203dcf722bf328866f058ab
                                                          • Opcode Fuzzy Hash: 11fff8d2de1bad746f91315b0226ba8e23e15a5c54a8124524942481a8a7a738
                                                          • Instruction Fuzzy Hash: D43150B15047029FD720DF64D884B9BBBE8FB48304F04092EE69AC3291D7B5A944CBB6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __FF_MSGBANNER.LIBCMT ref: 00D25963
                                                            • Part of subcall function 00D2A3AB: __NMSG_WRITE.LIBCMT ref: 00D2A3D2
                                                            • Part of subcall function 00D2A3AB: __NMSG_WRITE.LIBCMT ref: 00D2A3DC
                                                          • __NMSG_WRITE.LIBCMT ref: 00D2596A
                                                            • Part of subcall function 00D2A408: GetModuleFileNameW.KERNEL32(00000000,00DC43BA,00000104,?,00000001,00000000), ref: 00D2A49A
                                                            • Part of subcall function 00D2A408: ___crtMessageBoxW.LIBCMT ref: 00D2A548
                                                            • Part of subcall function 00D232DF: ___crtCorExitProcess.LIBCMT ref: 00D232E5
                                                            • Part of subcall function 00D232DF: ExitProcess.KERNEL32 ref: 00D232EE
                                                            • Part of subcall function 00D28D68: __getptd_noexit.LIBCMT ref: 00D28D68
                                                          • RtlAllocateHeap.NTDLL(016F0000,00000000,00000001,00000000,?,?,?,00D21013,?), ref: 00D2598F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 1372826849-0
                                                          • Opcode ID: 45440eeaaa78547bee8115b41bc72ba87f86e9c9c04c676436c925d31036f3c4
                                                          • Instruction ID: 2d8f2d2465842bc55dd70f6e6ff14a07131e3e8c4225593c1fb836c5882b7bf5
                                                          • Opcode Fuzzy Hash: 45440eeaaa78547bee8115b41bc72ba87f86e9c9c04c676436c925d31036f3c4
                                                          • Instruction Fuzzy Hash: 6C01C031241B36DEE6157B64F852E6A7248CF71738F14002AF4059A285DA719D818A74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00D697D2,?,?,?,?,?,00000004), ref: 00D69B45
                                                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00D697D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00D69B5B
                                                          • CloseHandle.KERNEL32(00000000,?,00D697D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00D69B62
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleTime
                                                          • String ID:
                                                          • API String ID: 3397143404-0
                                                          • Opcode ID: 71ea3d75e676d5377133af071b6668f6653bfb925fb1e186cffb50f5aa893597
                                                          • Instruction ID: a35b53771b2e63895cbd3c9db15834ca71b1f55dc1d73b5dd9e4b1e0d42789f0
                                                          • Opcode Fuzzy Hash: 71ea3d75e676d5377133af071b6668f6653bfb925fb1e186cffb50f5aa893597
                                                          • Instruction Fuzzy Hash: 62E08632580314B7D7212B54EC0DFCE7B18EB05761F144120FB14E91E0C7B1252197A8
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 00D68FA5
                                                            • Part of subcall function 00D22F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00D29C64), ref: 00D22FA9
                                                            • Part of subcall function 00D22F95: GetLastError.KERNEL32(00000000,?,00D29C64), ref: 00D22FBB
                                                          • _free.LIBCMT ref: 00D68FB6
                                                          • _free.LIBCMT ref: 00D68FC8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: efa5cfa9b1b2f41bce9affd07bef402890ef9bb67adc050918c04926c1923072
                                                          • Instruction ID: b2124b34587ce65a407ec90ff6fe7bad02719365207ff4e12fcf04f8bd82db7e
                                                          • Opcode Fuzzy Hash: efa5cfa9b1b2f41bce9affd07bef402890ef9bb67adc050918c04926c1923072
                                                          • Instruction Fuzzy Hash: 5EE05BB170D7115BCA24A579BE41EA357FE9F8835471C091DB509DB142DF24FC419134
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: CALL
                                                          • API String ID: 0-4196123274
                                                          • Opcode ID: 177f6cc992e8d0bf017a1cdee9ad7320d57f1f5f86f76b0c762521977871f8c9
                                                          • Instruction ID: c5de1074273f01f1b4b39285442cafe6af2d6717337b18980eb4af5dc5a19197
                                                          • Opcode Fuzzy Hash: 177f6cc992e8d0bf017a1cdee9ad7320d57f1f5f86f76b0c762521977871f8c9
                                                          • Instruction Fuzzy Hash: C2223874508351DFC724DF18C494B6ABBE1FF44314F19895DE89A8B2A2D731EC85CBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: EA06
                                                          • API String ID: 4104443479-3962188686
                                                          • Opcode ID: 9fe01b76699582c4c5cde2a908c2feb3f56f486eea36568f50aaba79e1643568
                                                          • Instruction ID: 1a72e75297688f408bbb297161e32501bbe62e7402a3223fa3244d47234c6a5a
                                                          • Opcode Fuzzy Hash: 9fe01b76699582c4c5cde2a908c2feb3f56f486eea36568f50aaba79e1643568
                                                          • Instruction Fuzzy Hash: 214158A1A041586BCF219B64D951FBF7FA6EF45300F2C4079FE8E9B2C6C6618D4487B1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsThemeActive.UXTHEME ref: 00D04992
                                                            • Part of subcall function 00D235AC: __lock.LIBCMT ref: 00D235B2
                                                            • Part of subcall function 00D235AC: DecodePointer.KERNEL32(00000001,?,00D049A7,00D581BC), ref: 00D235BE
                                                            • Part of subcall function 00D235AC: EncodePointer.KERNEL32(?,?,00D049A7,00D581BC), ref: 00D235C9
                                                            • Part of subcall function 00D04A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00D04A73
                                                            • Part of subcall function 00D04A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00D04A88
                                                            • Part of subcall function 00D03B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00D03B7A
                                                            • Part of subcall function 00D03B4C: IsDebuggerPresent.KERNEL32 ref: 00D03B8C
                                                            • Part of subcall function 00D03B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00DC62F8,00DC62E0,?,?), ref: 00D03BFD
                                                            • Part of subcall function 00D03B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00D03C81
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00D049D2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                          • String ID:
                                                          • API String ID: 1438897964-0
                                                          • Opcode ID: 01c806753d2134944ef4e5f05beaa5168fa8f77d0b45bae2504b77b3b6fb8a79
                                                          • Instruction ID: d4c7630fbf08f94b36402e0ce27a65479d57c0afdd96c625fd98e28fc836f471
                                                          • Opcode Fuzzy Hash: 01c806753d2134944ef4e5f05beaa5168fa8f77d0b45bae2504b77b3b6fb8a79
                                                          • Instruction Fuzzy Hash: 431138719183129BC700DF69EC45E0AFBE8EB94710F00451EF489C72A1DB709555CFB6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00D05981,?,?,?,?), ref: 00D05E27
                                                          • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00D05981,?,?,?,?), ref: 00D3E19C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 0d777257c464c6e6e328be2c1538055ac61c87f4e95829ee618a3c64fa53fa39
                                                          • Instruction ID: 505fe5411b9437b7192f67e067830e5f30d201686bf10043b56691e24427372f
                                                          • Opcode Fuzzy Hash: 0d777257c464c6e6e328be2c1538055ac61c87f4e95829ee618a3c64fa53fa39
                                                          • Instruction Fuzzy Hash: F8019270244708BEF3645E24DC8AF673B9CEB01768F148318BEE95A1E0C6B05E458F60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D2594C: __FF_MSGBANNER.LIBCMT ref: 00D25963
                                                            • Part of subcall function 00D2594C: __NMSG_WRITE.LIBCMT ref: 00D2596A
                                                            • Part of subcall function 00D2594C: RtlAllocateHeap.NTDLL(016F0000,00000000,00000001,00000000,?,?,?,00D21013,?), ref: 00D2598F
                                                          • std::exception::exception.LIBCMT ref: 00D2102C
                                                          • __CxxThrowException@8.LIBCMT ref: 00D21041
                                                            • Part of subcall function 00D287DB: RaiseException.KERNEL32(?,?,?,00DBBAF8,00000000,?,?,?,?,00D21046,?,00DBBAF8,?,00000001), ref: 00D28830
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 3902256705-0
                                                          • Opcode ID: 66660d46ebad7e473abf10756b1fca6e68483618b68069ad43d0e6f869b65bf9
                                                          • Instruction ID: f3ada91e889f4aaa287f7e0b24138e53056428d1a525d2e8e8d64f3419bd2a0b
                                                          • Opcode Fuzzy Hash: 66660d46ebad7e473abf10756b1fca6e68483618b68069ad43d0e6f869b65bf9
                                                          • Instruction Fuzzy Hash: D1F0CD3950137DB6CB20BA54FD05AEF7BACDF30359F144425F80496691EFB18A8496F0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __lock_file_memset
                                                          • String ID:
                                                          • API String ID: 26237723-0
                                                          • Opcode ID: 5d59dce152196363173a047b556fb16d35e0d659be117114e837d7f8c825e80a
                                                          • Instruction ID: cc16ce262b3ed510a6db546d6ea9dc62a84a78067734fb53285b22da0424586b
                                                          • Opcode Fuzzy Hash: 5d59dce152196363173a047b556fb16d35e0d659be117114e837d7f8c825e80a
                                                          • Instruction Fuzzy Hash: A4018871C01629EBCF21AF65BC01D9FBB61EF60364F144215B8145A1A5DB71C611EFB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D28D68: __getptd_noexit.LIBCMT ref: 00D28D68
                                                          • __lock_file.LIBCMT ref: 00D2561B
                                                            • Part of subcall function 00D26E4E: __lock.LIBCMT ref: 00D26E71
                                                          • __fclose_nolock.LIBCMT ref: 00D25626
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                          • String ID:
                                                          • API String ID: 2800547568-0
                                                          • Opcode ID: 32aaaf87dc30c6101d58166278778a8b06a65c57dd69c1f3e67514260f2a7073
                                                          • Instruction ID: 0a819186763250f0789e28ef93a8d6440b4343902e75392da09777f031ed1757
                                                          • Opcode Fuzzy Hash: 32aaaf87dc30c6101d58166278778a8b06a65c57dd69c1f3e67514260f2a7073
                                                          • Instruction Fuzzy Hash: 90F0F031801A309AD720AF74B802B6E67A1AF6133DF558209A451AB1C5CF7C8901AB75
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 01681B2D
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01681B51
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01681B73
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689593066.0000000001680000.00000040.00001000.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1680000_tems.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                          • Instruction ID: bed9c38fa6eb7a9bb5d7bcfc8e3a57f575dcc4445b9251a60156cb1bfde41745
                                                          • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                          • Instruction Fuzzy Hash: 6A12CD24E24658C6EB24DF64D8507DEB232EF68300F1091E9910DEB7A5E77A4F81CF5A
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a76715c0c3b8ceb2e713c71ef153852f6baa8c6808acf0ac66e9d167c6701867
                                                          • Instruction ID: dc07fce209674092cfb535943c787a289e7ee57658ff16e476e67fed6e5fad54
                                                          • Opcode Fuzzy Hash: a76715c0c3b8ceb2e713c71ef153852f6baa8c6808acf0ac66e9d167c6701867
                                                          • Instruction Fuzzy Hash: BE517E34600604AFCF14EB64D996FAE77A5EF45310F188168F84AAB296CF31ED44CB75
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00D05CF6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: 7f5743fb5563783ed70127616a0a169fefc8e196cfb7919df34a8d5cf5d48fbf
                                                          • Instruction ID: 69a799a75f42a24d720c5844226978cdb560aa6466c177ab9bd6ce2388283949
                                                          • Opcode Fuzzy Hash: 7f5743fb5563783ed70127616a0a169fefc8e196cfb7919df34a8d5cf5d48fbf
                                                          • Instruction Fuzzy Hash: C5314B31A00B09ABDB18DF29D48479EB7B5FF48310F18862ADC1997794D731A960DFA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: dd345aa015ce552def008873ec8563762efdcd67472fa373dd7823a1488874bd
                                                          • Instruction ID: 397f1a0e07a469d40fb22cf5a143f8981ddf07fe2dcd2bcd837e104bb5a377fb
                                                          • Opcode Fuzzy Hash: dd345aa015ce552def008873ec8563762efdcd67472fa373dd7823a1488874bd
                                                          • Instruction Fuzzy Hash: D6410974508351CFDB14DF18C494B1ABBE0BF45318F19889CE9898B7A2C736EC45CB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: da7f1282d5a64a6ed9a4c76883c4584a88b0b72cdbff40f5f3de7e9d14b987e7
                                                          • Instruction ID: 2798fed8a5770f8df8c203acf6c47e731d74fc8d13482bdbba5db18336874c30
                                                          • Opcode Fuzzy Hash: da7f1282d5a64a6ed9a4c76883c4584a88b0b72cdbff40f5f3de7e9d14b987e7
                                                          • Instruction Fuzzy Hash: DE21DE30A00B08EBCB149F15FC8576ABFB8FF14350F21856AE889C6190EBB0D4A08B71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D04D13: FreeLibrary.KERNEL32(00000000,?), ref: 00D04D4D
                                                            • Part of subcall function 00D2548B: __wfsopen.LIBCMT ref: 00D25496
                                                          • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00DC62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00D04F6F
                                                            • Part of subcall function 00D04CC8: FreeLibrary.KERNEL32(00000000), ref: 00D04D02
                                                            • Part of subcall function 00D04DD0: _memmove.LIBCMT ref: 00D04E1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Library$Free$Load__wfsopen_memmove
                                                          • String ID:
                                                          • API String ID: 1396898556-0
                                                          • Opcode ID: 9ae89b3af844d90625c24e20f11be459ef97fba19be50b1f0c32f77a188333cf
                                                          • Instruction ID: 2c7dee4d57f95b13171f4e064e4fbd6fd480cf392f9fd34ec76da7facabae511
                                                          • Opcode Fuzzy Hash: 9ae89b3af844d90625c24e20f11be459ef97fba19be50b1f0c32f77a188333cf
                                                          • Instruction Fuzzy Hash: 9311E7B1600306ABCB10BF70EC12FAE77A9DF80711F108429FA49E62C1DA719A159B70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: fc511ba2d0e80e6b9f699f909ff03f8f571e60c9bc74fd4e1b10291696d01fd2
                                                          • Instruction ID: 97a0c3bcb73bdf7996f04820e77340a7b9c4ced7cc03724180d71c813cc49b5e
                                                          • Opcode Fuzzy Hash: fc511ba2d0e80e6b9f699f909ff03f8f571e60c9bc74fd4e1b10291696d01fd2
                                                          • Instruction Fuzzy Hash: AA212474A08351DFCB14DF28C485B1ABBE0BF88314F098968F98A577A2D731F845CB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00D209F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath
                                                          • String ID:
                                                          • API String ID: 82841172-0
                                                          • Opcode ID: bb6c4f135b09ec6434a680283b67305a24fc78c96449972944d4893a89455d97
                                                          • Instruction ID: 620c2779f92595114226d4217897d48f5e8d76df47bf80ecce66ce264f39168d
                                                          • Opcode Fuzzy Hash: bb6c4f135b09ec6434a680283b67305a24fc78c96449972944d4893a89455d97
                                                          • Instruction Fuzzy Hash: 6401F77600B1818FEF22D364D8E57E43F728D93228B1992CA9841C7967C4D7091ECBE5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00D05807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00D05D76
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: FileRead
                                                          • String ID:
                                                          • API String ID: 2738559852-0
                                                          • Opcode ID: 285090e344d7383490b03785872205c3a725edd8a515232bdc1830f1c52d5e8e
                                                          • Instruction ID: 1cb29b7183b68e9e079c0cecd0e87f86917dfaa3cad9560cbe88de9b20e872c5
                                                          • Opcode Fuzzy Hash: 285090e344d7383490b03785872205c3a725edd8a515232bdc1830f1c52d5e8e
                                                          • Instruction Fuzzy Hash: 4C112531200B019FD320CF15E888B63B7E9EB45760F14892EE8AA86A94D7B1E945CF70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 9b54afcf07a23b9ff4e0bf05bec20c5cd47f57aecc711df460a32f44145caaaf
                                                          • Instruction ID: 834d69d65af84d2656b4bc84b4ea53dea2a351a19b5620d8f22f976f299caca5
                                                          • Opcode Fuzzy Hash: 9b54afcf07a23b9ff4e0bf05bec20c5cd47f57aecc711df460a32f44145caaaf
                                                          • Instruction Fuzzy Hash: 35017CB9604542ABC305DB29D951E26FBA9FF9A3147148159E819C7742DB30FC21CBF0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __lock_file.LIBCMT ref: 00D24AD6
                                                            • Part of subcall function 00D28D68: __getptd_noexit.LIBCMT ref: 00D28D68
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit__lock_file
                                                          • String ID:
                                                          • API String ID: 2597487223-0
                                                          • Opcode ID: 3210b60f3b26cda939594f71e18d6a674ab9599946d7c0801a05b0fd3dbf58f3
                                                          • Instruction ID: f28540831020fa45d0b6aa332be11a39c5e502fe80743c1f924e17491e0fffb5
                                                          • Opcode Fuzzy Hash: 3210b60f3b26cda939594f71e18d6a674ab9599946d7c0801a05b0fd3dbf58f3
                                                          • Instruction Fuzzy Hash: C6F0A431941229DBDF51AF64EC0639F3661EF2032DF088518F8149B1D1CB788950DF75
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,00DC62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00D04FDE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 7d99c46862b82a7aa5917fafd562b224ea499eddc1d3ceb378402d81a0beaa8d
                                                          • Instruction ID: 6aa2e9474eaca01a390fd53eeb196ce108a548532bf6ea512d06b27af17ddc73
                                                          • Opcode Fuzzy Hash: 7d99c46862b82a7aa5917fafd562b224ea499eddc1d3ceb378402d81a0beaa8d
                                                          • Instruction Fuzzy Hash: CAF039B1505712CFCB349F64E594D22BFE2BF143293248A3EE2DA82650CB32A840DF60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00D209F4
                                                            • Part of subcall function 00D07D2C: _memmove.LIBCMT ref: 00D07D66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_memmove
                                                          • String ID:
                                                          • API String ID: 2514874351-0
                                                          • Opcode ID: 20a6675dae1ae7eff51dbb17e6111b09ab58bfe32213e6a0ebf1a5bf0807ad8f
                                                          • Instruction ID: e9fb8b693c50bfefdbbdf71b2e93a71aae543dcc4215215a6bebb1e86813b5f1
                                                          • Opcode Fuzzy Hash: 20a6675dae1ae7eff51dbb17e6111b09ab58bfe32213e6a0ebf1a5bf0807ad8f
                                                          • Instruction Fuzzy Hash: 41E0863690422857C720D6589C05FFAB7ADDF89690F0401B5FC0CD7244D960AC8186B0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock
                                                          • String ID:
                                                          • API String ID: 2638373210-0
                                                          • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                                          • Instruction ID: 8251d5ff5db6f5e14733e04ec98f1c6adc282f664b6bb2506e38582314d9f464
                                                          • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                                          • Instruction Fuzzy Hash: 7AE092B0104B005FD7348A24E810BE3B3E4EB16315F04081CF2AA83341EB62B8418B69
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00D3E16B,?,?,00000000), ref: 00D05DBF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: e40539a35cf99a1c9715a8d6ee066b097ecc72f70fa85248568959abf20ac15a
                                                          • Instruction ID: bd60e33dced5487092106a777e8acd94212388513a3914bacbc25d0549275087
                                                          • Opcode Fuzzy Hash: e40539a35cf99a1c9715a8d6ee066b097ecc72f70fa85248568959abf20ac15a
                                                          • Instruction Fuzzy Hash: 59D0C77465030CBFE710DB80DC46FA9777CD705710F200194FD0496390D6B27D508795
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __wfsopen
                                                          • String ID:
                                                          • API String ID: 197181222-0
                                                          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction ID: f4a5f623b3a90a35fba5b39aeb85d6b739e91d41da03fbb6f98be71fd51fcbc6
                                                          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction Fuzzy Hash: E1B0927684020C77DE012E82FC02E697B199B54678F808060FB0C18162A673A6A196A9
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32(00000002,00000000), ref: 00D6D46A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast
                                                          • String ID:
                                                          • API String ID: 1452528299-0
                                                          • Opcode ID: 858ff351b3464bac85fbb66b252c47da7abaab99764a83be2f987a2769422cdd
                                                          • Instruction ID: 9d1e84b4ffd8d2a0b1e4f6bcb00c7b743204300d3b497d2f5796079fc39cdc92
                                                          • Opcode Fuzzy Hash: 858ff351b3464bac85fbb66b252c47da7abaab99764a83be2f987a2769422cdd
                                                          • Instruction Fuzzy Hash: 80713F306043019FC714EF28E491B6AB7E1EF99314F08456DF89A9B2A2DB30ED45CB72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction ID: eeda39f42e304746c3109c5931248b01c3cfd0c30af2bf812322b9b33cdef2ac
                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction Fuzzy Hash: 73311670A00115DFC718DF48E584969FBB6FF69304B298AA5E449CB652D731EDC1CBE0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 01682311
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689593066.0000000001680000.00000040.00001000.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1680000_tems.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                          • Instruction ID: e61a1f40c2805d12462b61bdf9b4239351c5a91c9e7bba989d269da4d6c3a0d2
                                                          • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                          • Instruction Fuzzy Hash: 44E09A7494010DAFDB00EFA4D94969E7BB4EF04302F1006A5FD0596681DA309A548A62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 01682311
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689593066.0000000001680000.00000040.00001000.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1680000_tems.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction ID: 622a0f90c62e32a7586f6b26c3fd8cccf4af4355dc117b684ed80488bc9ba652
                                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction Fuzzy Hash: 50E0E67494010DDFDB00EFB4D94969E7FB4EF04302F100665FD01D2281D6309D50CA62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D02612: GetWindowLongW.USER32(?,000000EB), ref: 00D02623
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00D8CE50
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D8CE91
                                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00D8CED6
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D8CF00
                                                          • SendMessageW.USER32 ref: 00D8CF29
                                                          • _wcsncpy.LIBCMT ref: 00D8CFA1
                                                          • GetKeyState.USER32(00000011), ref: 00D8CFC2
                                                          • GetKeyState.USER32(00000009), ref: 00D8CFCF
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D8CFE5
                                                          • GetKeyState.USER32(00000010), ref: 00D8CFEF
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D8D018
                                                          • SendMessageW.USER32 ref: 00D8D03F
                                                          • SendMessageW.USER32(?,00001030,?,00D8B602), ref: 00D8D145
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00D8D15B
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00D8D16E
                                                          • SetCapture.USER32(?), ref: 00D8D177
                                                          • ClientToScreen.USER32(?,?), ref: 00D8D1DC
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00D8D1E9
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00D8D203
                                                          • ReleaseCapture.USER32 ref: 00D8D20E
                                                          • GetCursorPos.USER32(?), ref: 00D8D248
                                                          • ScreenToClient.USER32(?,?), ref: 00D8D255
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00D8D2B1
                                                          • SendMessageW.USER32 ref: 00D8D2DF
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00D8D31C
                                                          • SendMessageW.USER32 ref: 00D8D34B
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00D8D36C
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00D8D37B
                                                          • GetCursorPos.USER32(?), ref: 00D8D39B
                                                          • ScreenToClient.USER32(?,?), ref: 00D8D3A8
                                                          • GetParent.USER32(?), ref: 00D8D3C8
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00D8D431
                                                          • SendMessageW.USER32 ref: 00D8D462
                                                          • ClientToScreen.USER32(?,?), ref: 00D8D4C0
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00D8D4F0
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00D8D51A
                                                          • SendMessageW.USER32 ref: 00D8D53D
                                                          • ClientToScreen.USER32(?,?), ref: 00D8D58F
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00D8D5C3
                                                            • Part of subcall function 00D025DB: GetWindowLongW.USER32(?,000000EB), ref: 00D025EC
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D8D65F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                          • String ID: @GUI_DRAGID$F
                                                          • API String ID: 3977979337-4164748364
                                                          • Opcode ID: f3c25fdc7130e276c5fd0c200d3fe5d33119a989d39e4ccd75e23c914941764c
                                                          • Instruction ID: 2d586fb58bf26e887ef6232e349a0689938eb56744ccd6e29a27b002d5aa9788
                                                          • Opcode Fuzzy Hash: f3c25fdc7130e276c5fd0c200d3fe5d33119a989d39e4ccd75e23c914941764c
                                                          • Instruction Fuzzy Hash: 9F425970214741EFD725AF28C888FAABBE5EF49314F180A19F695972E1D731D850CBB2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00D8873F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 3850602802-328681919
                                                          • Opcode ID: 7ccc0ec7540cdd1a935cabc433041a7b52b093b9fe03a1b35647743547780543
                                                          • Instruction ID: 06f117eb8d968ff8b5838d4c7efa5ab640eb936972737c123d36f97ebcd8e911
                                                          • Opcode Fuzzy Hash: 7ccc0ec7540cdd1a935cabc433041a7b52b093b9fe03a1b35647743547780543
                                                          • Instruction Fuzzy Hash: 9312F271500354ABEB24AF28DC49FAE7BB8EF49710F644169F915EA2E1EF708941DB30
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_memset
                                                          • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                                          • API String ID: 1357608183-1798697756
                                                          • Opcode ID: 9bc5fb06c08d29ce6636bf52bb947529a3e47b00e22191cc3071a85bd07c716f
                                                          • Instruction ID: 94797dc4c85f66efc0c5764fbd25e58f05a2cc9e7198b098ada95f9b879b92da
                                                          • Opcode Fuzzy Hash: 9bc5fb06c08d29ce6636bf52bb947529a3e47b00e22191cc3071a85bd07c716f
                                                          • Instruction Fuzzy Hash: A693B171A00215DBDF24CF58D881BEDB7B1FF48315F28816AED55AB290EB709E85CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,?), ref: 00D04A3D
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00D3DA8E
                                                          • IsIconic.USER32(?), ref: 00D3DA97
                                                          • ShowWindow.USER32(?,00000009), ref: 00D3DAA4
                                                          • SetForegroundWindow.USER32(?), ref: 00D3DAAE
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00D3DAC4
                                                          • GetCurrentThreadId.KERNEL32 ref: 00D3DACB
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00D3DAD7
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00D3DAE8
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00D3DAF0
                                                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 00D3DAF8
                                                          • SetForegroundWindow.USER32(?), ref: 00D3DAFB
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D3DB10
                                                          • keybd_event.USER32(00000012,00000000), ref: 00D3DB1B
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D3DB25
                                                          • keybd_event.USER32(00000012,00000000), ref: 00D3DB2A
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D3DB33
                                                          • keybd_event.USER32(00000012,00000000), ref: 00D3DB38
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D3DB42
                                                          • keybd_event.USER32(00000012,00000000), ref: 00D3DB47
                                                          • SetForegroundWindow.USER32(?), ref: 00D3DB4A
                                                          • AttachThreadInput.USER32(?,?,00000000), ref: 00D3DB71
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 63bf67cfe8fabfdb85328a02624952dad1d3f1d6a8b6aa569b01c487880e7b9d
                                                          • Instruction ID: 52c6b553619ae72c0eb5eb7d4d18fb30d64819c60b86c44860481e690d5479e9
                                                          • Opcode Fuzzy Hash: 63bf67cfe8fabfdb85328a02624952dad1d3f1d6a8b6aa569b01c487880e7b9d
                                                          • Instruction Fuzzy Hash: FF315271A50318BBEB216F619C4AF7E7E6DEB44B50F154065FA04EA2D0D6B05910AFB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D58CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D58D0D
                                                            • Part of subcall function 00D58CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D58D3A
                                                            • Part of subcall function 00D58CC3: GetLastError.KERNEL32 ref: 00D58D47
                                                          • _memset.LIBCMT ref: 00D5889B
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00D588ED
                                                          • CloseHandle.KERNEL32(?), ref: 00D588FE
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00D58915
                                                          • GetProcessWindowStation.USER32 ref: 00D5892E
                                                          • SetProcessWindowStation.USER32(00000000), ref: 00D58938
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00D58952
                                                            • Part of subcall function 00D58713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00D58851), ref: 00D58728
                                                            • Part of subcall function 00D58713: CloseHandle.KERNEL32(?,?,00D58851), ref: 00D5873A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                          • String ID: $default$winsta0
                                                          • API String ID: 2063423040-1027155976
                                                          • Opcode ID: a4513c7859ea4bfbf047bf8183d188ebd3582f3027ab80750e5f423d1be7e46b
                                                          • Instruction ID: 72aa65aedaaf52dacb7ddc6cd9aab7f77162c5e7e548df0833f0aedb73a6475a
                                                          • Opcode Fuzzy Hash: a4513c7859ea4bfbf047bf8183d188ebd3582f3027ab80750e5f423d1be7e46b
                                                          • Instruction Fuzzy Hash: D9812C71900249AFDF11DFA4DD45AEEBBB8EF04306F18416AFD11B6261DB318E19AB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • OpenClipboard.USER32(00D8F910), ref: 00D74284
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00D74292
                                                          • GetClipboardData.USER32(0000000D), ref: 00D7429A
                                                          • CloseClipboard.USER32 ref: 00D742A6
                                                          • GlobalLock.KERNEL32(00000000), ref: 00D742C2
                                                          • CloseClipboard.USER32 ref: 00D742CC
                                                          • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00D742E1
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00D742EE
                                                          • GetClipboardData.USER32(00000001), ref: 00D742F6
                                                          • GlobalLock.KERNEL32(00000000), ref: 00D74303
                                                          • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00D74337
                                                          • CloseClipboard.USER32 ref: 00D74447
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                          • String ID:
                                                          • API String ID: 3222323430-0
                                                          • Opcode ID: 47d90003c37228dec8ed8bb16475523c66bd9a066a1e74750854eb21e3279160
                                                          • Instruction ID: 136c68c23999ad6e69cf6c6d3fb44f088e5029bf9c2ea0bba35eabcbf9b78131
                                                          • Opcode Fuzzy Hash: 47d90003c37228dec8ed8bb16475523c66bd9a066a1e74750854eb21e3279160
                                                          • Instruction Fuzzy Hash: 4B518271204302ABD701BF64EC96F6E77A8EF84B10F144529F999D62E2EF70D9048B76
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00D6C9F8
                                                          • FindClose.KERNEL32(00000000), ref: 00D6CA4C
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00D6CA71
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00D6CA88
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D6CAAF
                                                          • __swprintf.LIBCMT ref: 00D6CAFB
                                                          • __swprintf.LIBCMT ref: 00D6CB3E
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                          • __swprintf.LIBCMT ref: 00D6CB92
                                                            • Part of subcall function 00D238D8: __woutput_l.LIBCMT ref: 00D23931
                                                          • __swprintf.LIBCMT ref: 00D6CBE0
                                                            • Part of subcall function 00D238D8: __flsbuf.LIBCMT ref: 00D23953
                                                            • Part of subcall function 00D238D8: __flsbuf.LIBCMT ref: 00D2396B
                                                          • __swprintf.LIBCMT ref: 00D6CC2F
                                                          • __swprintf.LIBCMT ref: 00D6CC7E
                                                          • __swprintf.LIBCMT ref: 00D6CCCD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                          • API String ID: 3953360268-2428617273
                                                          • Opcode ID: 93d499d1942832d589155b877f44ce6ba4ea8a234d0e3f349357e7b35e0b6c06
                                                          • Instruction ID: 8f39981ea7d9446677d2d4dc41eea2f1fb94174981250e22fa768c0e8471b720
                                                          • Opcode Fuzzy Hash: 93d499d1942832d589155b877f44ce6ba4ea8a234d0e3f349357e7b35e0b6c06
                                                          • Instruction Fuzzy Hash: 7FA111B1518305ABC710EB64D895EAFB7ECEF94704F40491DF589C7192EA34EA48CB72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00D6F221
                                                          • _wcscmp.LIBCMT ref: 00D6F236
                                                          • _wcscmp.LIBCMT ref: 00D6F24D
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00D6F25F
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00D6F279
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00D6F291
                                                          • FindClose.KERNEL32(00000000), ref: 00D6F29C
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00D6F2B8
                                                          • _wcscmp.LIBCMT ref: 00D6F2DF
                                                          • _wcscmp.LIBCMT ref: 00D6F2F6
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00D6F308
                                                          • SetCurrentDirectoryW.KERNEL32(00DBA5A0), ref: 00D6F326
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D6F330
                                                          • FindClose.KERNEL32(00000000), ref: 00D6F33D
                                                          • FindClose.KERNEL32(00000000), ref: 00D6F34F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1803514871-438819550
                                                          • Opcode ID: c86aff451e6b941dc41c33348cc3a1f68aed261b9a17cd5ba0b08849abce0374
                                                          • Instruction ID: a642173ae421416d5727a2a485d67f35f30aa6da9389df59383f22eed2f033dd
                                                          • Opcode Fuzzy Hash: c86aff451e6b941dc41c33348cc3a1f68aed261b9a17cd5ba0b08849abce0374
                                                          • Instruction Fuzzy Hash: 6831B0765016196FDF20DBB4EC59ADE73ACEF48361F140175E810D32A0EB30DA458B74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D80BDE
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00D8F910,00000000,?,00000000,?,?), ref: 00D80C4C
                                                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00D80C94
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00D80D1D
                                                          • RegCloseKey.ADVAPI32(?), ref: 00D8103D
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D8104A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectCreateRegistryValue
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 536824911-966354055
                                                          • Opcode ID: 60a9401b2b17a91491aed4fe7ed207293cb9e8a81a214b1220b0b724570d522c
                                                          • Instruction ID: a17c143243644e0d411ca0f3bc20f4dba7207a927ddf8956bb740f87c486fe15
                                                          • Opcode Fuzzy Hash: 60a9401b2b17a91491aed4fe7ed207293cb9e8a81a214b1220b0b724570d522c
                                                          • Instruction Fuzzy Hash: D5025F752006119FCB14EF28D895E2ABBE5FF89714F04845DF88A9B3A2CB70ED45CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00D6F37E
                                                          • _wcscmp.LIBCMT ref: 00D6F393
                                                          • _wcscmp.LIBCMT ref: 00D6F3AA
                                                            • Part of subcall function 00D645C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00D645DC
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00D6F3D9
                                                          • FindClose.KERNEL32(00000000), ref: 00D6F3E4
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00D6F400
                                                          • _wcscmp.LIBCMT ref: 00D6F427
                                                          • _wcscmp.LIBCMT ref: 00D6F43E
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00D6F450
                                                          • SetCurrentDirectoryW.KERNEL32(00DBA5A0), ref: 00D6F46E
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D6F478
                                                          • FindClose.KERNEL32(00000000), ref: 00D6F485
                                                          • FindClose.KERNEL32(00000000), ref: 00D6F497
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 1824444939-438819550
                                                          • Opcode ID: ff6945a16aa6ead905dae35616aa88341264eb0f5383a3f602699a5a79bbc5bc
                                                          • Instruction ID: 03fcab4976383dfdd1192938762f38598beb60066e12ca65ed4a69a78365ac7f
                                                          • Opcode Fuzzy Hash: ff6945a16aa6ead905dae35616aa88341264eb0f5383a3f602699a5a79bbc5bc
                                                          • Instruction Fuzzy Hash: E831C3725016196FCF20ABA4FC88ADE77ACDF49364F140175E850E31A0DB35EA44CB74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D5874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D58766
                                                            • Part of subcall function 00D5874A: GetLastError.KERNEL32(?,00D5822A,?,?,?), ref: 00D58770
                                                            • Part of subcall function 00D5874A: GetProcessHeap.KERNEL32(00000008,?,?,00D5822A,?,?,?), ref: 00D5877F
                                                            • Part of subcall function 00D5874A: HeapAlloc.KERNEL32(00000000,?,00D5822A,?,?,?), ref: 00D58786
                                                            • Part of subcall function 00D5874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D5879D
                                                            • Part of subcall function 00D587E7: GetProcessHeap.KERNEL32(00000008,00D58240,00000000,00000000,?,00D58240,?), ref: 00D587F3
                                                            • Part of subcall function 00D587E7: HeapAlloc.KERNEL32(00000000,?,00D58240,?), ref: 00D587FA
                                                            • Part of subcall function 00D587E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00D58240,?), ref: 00D5880B
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00D5825B
                                                          • _memset.LIBCMT ref: 00D58270
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00D5828F
                                                          • GetLengthSid.ADVAPI32(?), ref: 00D582A0
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00D582DD
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00D582F9
                                                          • GetLengthSid.ADVAPI32(?), ref: 00D58316
                                                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00D58325
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00D5832C
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00D5834D
                                                          • CopySid.ADVAPI32(00000000), ref: 00D58354
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00D58385
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00D583AB
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00D583BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                          • String ID:
                                                          • API String ID: 3996160137-0
                                                          • Opcode ID: d6c434f9dcec244c3b1c58703771ec2be636489962f1c3ed952e0a199316003c
                                                          • Instruction ID: 8c3c411f4017cee6993153c0aaa1a2eb5f7241478e101b4959d1b12bfd4c18fe
                                                          • Opcode Fuzzy Hash: d6c434f9dcec244c3b1c58703771ec2be636489962f1c3ed952e0a199316003c
                                                          • Instruction Fuzzy Hash: 27613871A00209AFEF009FA4DC85EAEBBB9FF04705F148169EC15E7291DB359A19DB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                          • API String ID: 0-4052911093
                                                          • Opcode ID: 9d1c95f18dd609475a0688fbaf776c12244802045bea276fcd09b10e2cb82605
                                                          • Instruction ID: a3c7760cc80d4456e5d89682813066ac828d7d0decec53e2f7d1aa1b754de432
                                                          • Opcode Fuzzy Hash: 9d1c95f18dd609475a0688fbaf776c12244802045bea276fcd09b10e2cb82605
                                                          • Instruction Fuzzy Hash: 45724D75E002199BDF24CF59D8807EEB7B5EF48711F18816AEC55EB280EB70D985CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D810A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D80038,?,?), ref: 00D810BC
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D80737
                                                            • Part of subcall function 00D09997: __itow.LIBCMT ref: 00D099C2
                                                            • Part of subcall function 00D09997: __swprintf.LIBCMT ref: 00D09A0C
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00D807D6
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00D8086E
                                                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00D80AAD
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D80ABA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1240663315-0
                                                          • Opcode ID: fd76f60feff1f6b1b5d724257b1f20d069e74d1e22faca7f83e78513128303c9
                                                          • Instruction ID: ce2ac808832205adc3fcd8f3b0052a5d8a7af8287a7c642193dad23da7b927e2
                                                          • Opcode Fuzzy Hash: fd76f60feff1f6b1b5d724257b1f20d069e74d1e22faca7f83e78513128303c9
                                                          • Instruction Fuzzy Hash: AFE13031204310AFCB54EF28C895E6ABBE4EF89714F04856DF459DB2A2DB30ED45CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00D60241
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00D602C2
                                                          • GetKeyState.USER32(000000A0), ref: 00D602DD
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00D602F7
                                                          • GetKeyState.USER32(000000A1), ref: 00D6030C
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00D60324
                                                          • GetKeyState.USER32(00000011), ref: 00D60336
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00D6034E
                                                          • GetKeyState.USER32(00000012), ref: 00D60360
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00D60378
                                                          • GetKeyState.USER32(0000005B), ref: 00D6038A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 027f7a7c56c206e282e300d3f896df537a1a218592571a81801e05ced6ec5390
                                                          • Instruction ID: 9d39360739d3820d2427d59da9a8f7ded236788425644a7dbfce4c4c84f8a268
                                                          • Opcode Fuzzy Hash: 027f7a7c56c206e282e300d3f896df537a1a218592571a81801e05ced6ec5390
                                                          • Instruction Fuzzy Hash: AE4195345147C96FFF319B6488183A7BEA0AF16345F0C409DD5C6867C2EB949DC887B6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D09997: __itow.LIBCMT ref: 00D099C2
                                                            • Part of subcall function 00D09997: __swprintf.LIBCMT ref: 00D09A0C
                                                          • CoInitialize.OLE32 ref: 00D78718
                                                          • CoUninitialize.OLE32 ref: 00D78723
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,00D92BEC,?), ref: 00D78783
                                                          • IIDFromString.OLE32(?,?), ref: 00D787F6
                                                          • VariantInit.OLEAUT32(?), ref: 00D78890
                                                          • VariantClear.OLEAUT32(?), ref: 00D788F1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 834269672-1287834457
                                                          • Opcode ID: ee52b803b698162ffb03a5974961332ffb16134dddbbfa9378c8678ea5b1b858
                                                          • Instruction ID: 39326bfbcf7c8a0b55a08e6bbb5b1901b5fb478355898ac2a81f5b60e7454cd2
                                                          • Opcode Fuzzy Hash: ee52b803b698162ffb03a5974961332ffb16134dddbbfa9378c8678ea5b1b858
                                                          • Instruction Fuzzy Hash: D561CF706483119FC710DF24D849B6ABBE4EF48714F14881DF88A9B291EB70ED48DBB2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: 70d9851bc91fb01972a8a6484f04520233b80b066117d26b762e06b8d1ae9ac5
                                                          • Instruction ID: e89cfe6df52ad08810970a8a0e3c783f235b4a0c1602f6186d2c12dd9c5dea65
                                                          • Opcode Fuzzy Hash: 70d9851bc91fb01972a8a6484f04520233b80b066117d26b762e06b8d1ae9ac5
                                                          • Instruction Fuzzy Hash: E3216D35210211AFDB11AF64EC59B69B7A8EF04715F14802AF94ADB3A2EB74ED00CB74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D048AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D048A1,?,?,00D037C0,?), ref: 00D048CE
                                                            • Part of subcall function 00D64CD3: GetFileAttributesW.KERNEL32(?,00D63947), ref: 00D64CD4
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00D63ADF
                                                          • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00D63B87
                                                          • MoveFileW.KERNEL32(?,?), ref: 00D63B9A
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00D63BB7
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D63BD9
                                                          • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00D63BF5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 4002782344-1173974218
                                                          • Opcode ID: deffffd4806e5bb2253936f4bf5765b9c4522b488f1860c20cb115bf73419ea2
                                                          • Instruction ID: cf9b4f21f5b22eb63df58ce1f99f1d88022711feca7042ce380bb16b26f0152d
                                                          • Opcode Fuzzy Hash: deffffd4806e5bb2253936f4bf5765b9c4522b488f1860c20cb115bf73419ea2
                                                          • Instruction Fuzzy Hash: D5515F31905249ABCF15EBA4DE92AEEB778EF14300F644169E446B7191DF316F09CBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                          • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00D6F6AB
                                                          • Sleep.KERNEL32(0000000A), ref: 00D6F6DB
                                                          • _wcscmp.LIBCMT ref: 00D6F6EF
                                                          • _wcscmp.LIBCMT ref: 00D6F70A
                                                          • FindNextFileW.KERNEL32(?,?), ref: 00D6F7A8
                                                          • FindClose.KERNEL32(00000000), ref: 00D6F7BE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                          • String ID: *.*
                                                          • API String ID: 713712311-438819550
                                                          • Opcode ID: 84e3bee79729f807013153ddbc61c668a1ee8965907a1ca43e5f4c6a51c7293a
                                                          • Instruction ID: 4d7b8272775a8e6a66e81e7831a0993813399627961dc9bf1c9c829bb4d0d028
                                                          • Opcode Fuzzy Hash: 84e3bee79729f807013153ddbc61c668a1ee8965907a1ca43e5f4c6a51c7293a
                                                          • Instruction Fuzzy Hash: D3416F7190161AAFCF15DF64DC85AEEBBB4FF15310F144566E819A72A0DB30AE84CBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                          • API String ID: 0-1546025612
                                                          • Opcode ID: fb355617e12a95f8942b9dbd29ef147f9c092ed4c76b590e00e60d1c34664a59
                                                          • Instruction ID: 3e3d83a6427309616a6894af1db2ac6337ae3857f1d619e093dc65c0f4735bfe
                                                          • Opcode Fuzzy Hash: fb355617e12a95f8942b9dbd29ef147f9c092ed4c76b590e00e60d1c34664a59
                                                          • Instruction Fuzzy Hash: 09A27D74E0421ADBDF24CF58D9907EDB7B1AF55314F1881AAE859A7280DB309EC1DFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 4814835f5bf347927fec29969ece4edb1b9ad26113fe7cd889941725006772b6
                                                          • Instruction ID: 8621c9c00cb36521d26ed90a71185c9004873100bff0a24aff447b80985bd34f
                                                          • Opcode Fuzzy Hash: 4814835f5bf347927fec29969ece4edb1b9ad26113fe7cd889941725006772b6
                                                          • Instruction Fuzzy Hash: E5129E70A00609EBDF14CFA4E981AEEB7F5FF48300F144269E846E7295EB35A955CB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D58CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D58D0D
                                                            • Part of subcall function 00D58CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D58D3A
                                                            • Part of subcall function 00D58CC3: GetLastError.KERNEL32 ref: 00D58D47
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 00D6549B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-194228
                                                          • Opcode ID: 3e94542a6ded40ded6196d16bfef28d21029230f78248150a4124da406eef0b4
                                                          • Instruction ID: 65e73dce6555900c29497fa2b745370f9e7076477595b9df7e1e67cf48dfa6f2
                                                          • Opcode Fuzzy Hash: 3e94542a6ded40ded6196d16bfef28d21029230f78248150a4124da406eef0b4
                                                          • Instruction Fuzzy Hash: EE01F731665B156FE7285778FC4ABBA7258EB04353F2805A1FC47E21D6DE516CC482B0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 00D765EF
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00D765FE
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00D7661A
                                                          • listen.WSOCK32(00000000,00000005), ref: 00D76629
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00D76643
                                                          • closesocket.WSOCK32(00000000), ref: 00D76657
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketlistensocket
                                                          • String ID:
                                                          • API String ID: 1279440585-0
                                                          • Opcode ID: 6610b47687cdfed8a9d5f8e9d033316da18dfd693e93e45ebae9c57b33d3c7ef
                                                          • Instruction ID: 77703a6223ffd8ecff292ea280d58f4d648880aa9a09f43e74508cee5634fa31
                                                          • Opcode Fuzzy Hash: 6610b47687cdfed8a9d5f8e9d033316da18dfd693e93e45ebae9c57b33d3c7ef
                                                          • Instruction Fuzzy Hash: 7F218D70600600AFDB10AF64C849B6EB7A9EF44320F148199E95AE73D2EB70ED018B71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D20FF6: std::exception::exception.LIBCMT ref: 00D2102C
                                                            • Part of subcall function 00D20FF6: __CxxThrowException@8.LIBCMT ref: 00D21041
                                                          • _memmove.LIBCMT ref: 00D5062F
                                                          • _memmove.LIBCMT ref: 00D50744
                                                          • _memmove.LIBCMT ref: 00D507EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1300846289-0
                                                          • Opcode ID: 743599f754feeaa6feed3e34f2831a9c955225eaef5c54bd42707aea52c118da
                                                          • Instruction ID: a2f548d8ad17cc6d8b7a0106f45097cf884819a03adec994752ca2af416bff1f
                                                          • Opcode Fuzzy Hash: 743599f754feeaa6feed3e34f2831a9c955225eaef5c54bd42707aea52c118da
                                                          • Instruction Fuzzy Hash: AC027270E00205EBDF04DF64E981AAEBBB5EF98300F148069EC46DB295EB35D955CBB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D02612: GetWindowLongW.USER32(?,000000EB), ref: 00D02623
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00D019FA
                                                          • GetSysColor.USER32(0000000F), ref: 00D01A4E
                                                          • SetBkColor.GDI32(?,00000000), ref: 00D01A61
                                                            • Part of subcall function 00D01290: DefDlgProcW.USER32(?,00000020,?), ref: 00D012D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ColorProc$LongWindow
                                                          • String ID:
                                                          • API String ID: 3744519093-0
                                                          • Opcode ID: bddf15401f08f784b02f6f09c5f089deb1eec99138f3ba5cd3406d61d44ec5ab
                                                          • Instruction ID: 70c4d492439455f5fffe43d3086496e641d70e5ef6c8cb5d5ad21415a25e03b4
                                                          • Opcode Fuzzy Hash: bddf15401f08f784b02f6f09c5f089deb1eec99138f3ba5cd3406d61d44ec5ab
                                                          • Instruction Fuzzy Hash: B0A17978212546BEE639ABA99C48FBF359CDF42351F1C020AF54AD62D2CF20DD0293B5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D780A0: inet_addr.WSOCK32(00000000), ref: 00D780CB
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00D76AB1
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00D76ADA
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00D76B13
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00D76B20
                                                          • closesocket.WSOCK32(00000000), ref: 00D76B34
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 99427753-0
                                                          • Opcode ID: 0655feb79ae431499d5f40bc73dc87b7ee831db6a9e4ecde214487c8b6077f17
                                                          • Instruction ID: 6c8a56c3f1e70fb6d0eabbeb6d5029e4e825ce372244fee6bc69a3661849084b
                                                          • Opcode Fuzzy Hash: 0655feb79ae431499d5f40bc73dc87b7ee831db6a9e4ecde214487c8b6077f17
                                                          • Instruction Fuzzy Hash: EB418375740610AFEB10AF68DC96F6EB7A9DB44710F448058F95EAB3D3DA709D008BB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: ec7763dddf5815e085f4c5cf7bd8f484056e959942a7e67d690815341f7db26b
                                                          • Instruction ID: f5a53df16bdcf896627b06780c0c5bfe8116f962c06bc3f4447cb27caedfa6fb
                                                          • Opcode Fuzzy Hash: ec7763dddf5815e085f4c5cf7bd8f484056e959942a7e67d690815341f7db26b
                                                          • Instruction Fuzzy Hash: A311C131300A116FEB216F26EC46B2FBB99EF84721B844039F84AD7241EB30D9018BB4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00D41D88,?), ref: 00D7C312
                                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00D7C324
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                          • API String ID: 2574300362-1816364905
                                                          • Opcode ID: 054fe677ece8d5b82932a51a10a75d5cdf7704280cfcf0161ee084304b56721f
                                                          • Instruction ID: 74489d21f1a7d7edcfe684fe63a79428b4bd8459192d0008deee3e1bcf08ac2d
                                                          • Opcode Fuzzy Hash: 054fe677ece8d5b82932a51a10a75d5cdf7704280cfcf0161ee084304b56721f
                                                          • Instruction Fuzzy Hash: 77E0EC75620713CFDB205F25D808B9676D4EB09765B84D43EE89AD2260E770D881CB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __itow__swprintf
                                                          • String ID:
                                                          • API String ID: 674341424-0
                                                          • Opcode ID: e0a67b94791bb0bd3d4d9c2202baa947783d7e970b52b92dacb1aefb7aee3c79
                                                          • Instruction ID: fd7b54cec7cfb66f50fc0171877570be05d18f518b0209a5fad0e60479278ef2
                                                          • Opcode Fuzzy Hash: e0a67b94791bb0bd3d4d9c2202baa947783d7e970b52b92dacb1aefb7aee3c79
                                                          • Instruction Fuzzy Hash: 88228971608301AFD724DF24D891BABB7E5EF84704F14491DF89A97292DB70EA44CBB2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00D7F151
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00D7F15F
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00D7F21F
                                                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00D7F22E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                          • String ID:
                                                          • API String ID: 2576544623-0
                                                          • Opcode ID: f8f7fde484f99c15769c77d8364011497e87900159fc217ac5f3229fdd109c30
                                                          • Instruction ID: 0b91720cb4da772bcf470a2c69b76c4ec24c668e1d5acff9d0e794d971de7c7e
                                                          • Opcode Fuzzy Hash: f8f7fde484f99c15769c77d8364011497e87900159fc217ac5f3229fdd109c30
                                                          • Instruction Fuzzy Hash: 69514D71504311AFD320EF24DC85B6BB7E8EF98710F54492DF99997292EB70A904CBB2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00D640D1
                                                          • _memset.LIBCMT ref: 00D640F2
                                                          • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00D64144
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D6414D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle_memset
                                                          • String ID:
                                                          • API String ID: 1157408455-0
                                                          • Opcode ID: 4c6d5b25789764daffaf12b95f9ba324aefd3147858233044090a44b1a162455
                                                          • Instruction ID: 02dc52ecef1db436c90bcdfe83063820624174cf669bb8bb884fbfaf608ef2bf
                                                          • Opcode Fuzzy Hash: 4c6d5b25789764daffaf12b95f9ba324aefd3147858233044090a44b1a162455
                                                          • Instruction Fuzzy Hash: 5B11A7759013287AD7309BA5AC4DFABBB7CEF45764F1041AAF908D7280D6744E848BB4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00D5EB19
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: ee83e4605160ab2fb079bc47f6d6e3df222d663692ec607f2cd77bc0ea4b10fe
                                                          • Instruction ID: 10c39549d2df281368280fc960d9810d711d0547b317f624dc9972df34d43fef
                                                          • Opcode Fuzzy Hash: ee83e4605160ab2fb079bc47f6d6e3df222d663692ec607f2cd77bc0ea4b10fe
                                                          • Instruction Fuzzy Hash: 4F323675A007059FDB28DF19C481A6AB7F1FF48320B15C56EE89ADB3A1EB70E941CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00D726D5
                                                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00D7270C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Internet$AvailableDataFileQueryRead
                                                          • String ID:
                                                          • API String ID: 599397726-0
                                                          • Opcode ID: 247be028b44b98caa3d2aba8560265c010195ed9b4859eb36f57d6ff2da4e078
                                                          • Instruction ID: 9fd015dca1dade4fd524c00ad391a3f813e000d1e5458bad4a470919676d9518
                                                          • Opcode Fuzzy Hash: 247be028b44b98caa3d2aba8560265c010195ed9b4859eb36f57d6ff2da4e078
                                                          • Instruction Fuzzy Hash: B141C371900289BFEB209A54DD85EBFB7BCEB40728F14806EF649A6240FA719E419670
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00D6B5AE
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00D6B608
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00D6B655
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: 4b4606eac67919aa54e07c829ea70f57b5609d9115a745b189e84a2cf3fa8469
                                                          • Instruction ID: 397516e40a10d3f301bd30912358204b58a6b162462644e9a0b5a132857d4a7a
                                                          • Opcode Fuzzy Hash: 4b4606eac67919aa54e07c829ea70f57b5609d9115a745b189e84a2cf3fa8469
                                                          • Instruction Fuzzy Hash: 5F216235A10218EFCB00DFA5D884AADFBB8FF49310F1480A9E805EB351DB319955CF61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D20FF6: std::exception::exception.LIBCMT ref: 00D2102C
                                                            • Part of subcall function 00D20FF6: __CxxThrowException@8.LIBCMT ref: 00D21041
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D58D0D
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D58D3A
                                                          • GetLastError.KERNEL32 ref: 00D58D47
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1922334811-0
                                                          • Opcode ID: cb81f6f88918014b242c3f7625fab96897c2b3d80d794bd040e916442e54fbb2
                                                          • Instruction ID: 735abf01eb41f67e9a66ffef7ba951e8b2fe8bc55842b14dc541705a69300404
                                                          • Opcode Fuzzy Hash: cb81f6f88918014b242c3f7625fab96897c2b3d80d794bd040e916442e54fbb2
                                                          • Instruction Fuzzy Hash: 4611BFB1414308AFD7289F54EC85D6BB7F8EB14711B20852EF84693241EB30AC408B30
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00D64C2C
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00D64C43
                                                          • FreeSid.ADVAPI32(?), ref: 00D64C53
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 2b19741345a61a8b3880c4ec4b9f2158d1ddd9d149deb2903bcb42070fa367b5
                                                          • Instruction ID: 5ebb7f0b46221dd310222c2822c513077dc09ee0a880e62afde986d3a5571bd6
                                                          • Opcode Fuzzy Hash: 2b19741345a61a8b3880c4ec4b9f2158d1ddd9d149deb2903bcb42070fa367b5
                                                          • Instruction Fuzzy Hash: C7F06D75A1130CBFDF04DFF0DC89ABEBBBCEF08201F1044A9A901E2281E7746A148B60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f96c5f8fb3a60205643749c76ee9136ac4d0b8007cad7cfa0378f7b773b34829
                                                          • Instruction ID: 2f73f9090be845b29937e0accd6536593bc1e26b6cfbebd24a09c1812d04bb50
                                                          • Opcode Fuzzy Hash: f96c5f8fb3a60205643749c76ee9136ac4d0b8007cad7cfa0378f7b773b34829
                                                          • Instruction Fuzzy Hash: AD229074A00215DFDB24DF58C485BAEBBB0FF14300F188969E89A9B391D774E985CBB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00D6C966
                                                          • FindClose.KERNEL32(00000000), ref: 00D6C996
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: eed458565aace6ea30995121db3d54fe402b66cb7b72147fe9cd2a9fc8233605
                                                          • Instruction ID: 6a8564acb331ebdf6c9d867e1cf352195124f5a653957dfa6f64ff4f54b5b483
                                                          • Opcode Fuzzy Hash: eed458565aace6ea30995121db3d54fe402b66cb7b72147fe9cd2a9fc8233605
                                                          • Instruction Fuzzy Hash: 7B115E726106009FDB10EF29D855A2AF7E9EF84325F04851EF8A9D7291DB70AC04CBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00D7977D,?,00D8FB84,?), ref: 00D6A302
                                                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00D7977D,?,00D8FB84,?), ref: 00D6A314
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 7ba92e7df5a2493449cd6cf312b4127f9dff97d96e88c63c3c5f0a1bb7ddefcf
                                                          • Instruction ID: f5aec1d6354a869c2a859c82aa1855a96f2b0c1ff525f9cc5ec94a7f17d340cb
                                                          • Opcode Fuzzy Hash: 7ba92e7df5a2493449cd6cf312b4127f9dff97d96e88c63c3c5f0a1bb7ddefcf
                                                          • Instruction Fuzzy Hash: 16F0823555432DABDB109FA4CC48FEA776DFF09761F004165F948D6281D6309940CBB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00D58851), ref: 00D58728
                                                          • CloseHandle.KERNEL32(?,?,00D58851), ref: 00D5873A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: d2e40a376083e819474839be2a92cb6f6ca7ac0aaf900ddb7c77e96556dacf93
                                                          • Instruction ID: d2508395393ea766b0bf5698957bf5889d114827b2ab2bfdfb819d546a2d23c0
                                                          • Opcode Fuzzy Hash: d2e40a376083e819474839be2a92cb6f6ca7ac0aaf900ddb7c77e96556dacf93
                                                          • Instruction Fuzzy Hash: 87E0B676010650EEEB252B60FD09E777BA9EB14755B248829F896C0470DB62AC90DB30
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00D28F97,?,?,?,00000001), ref: 00D2A39A
                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00D2A3A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 0b3a50981ba9167d43e265b388f658af0917a49ba7f07362bb7bc1d934fcfb6c
                                                          • Instruction ID: 1b3773ceeb35384fd48fe21c7894baa16ff8f6603bbf87ab2db821d41c6d955c
                                                          • Opcode Fuzzy Hash: 0b3a50981ba9167d43e265b388f658af0917a49ba7f07362bb7bc1d934fcfb6c
                                                          • Instruction Fuzzy Hash: 12B09231264308ABCA002B91EC09BA83F68EB46AA2F404020F60DC4260CB6254508BA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a05c00ec4dbb63dc6042900f6502e5f2c001f692359ef839f3f88f686fbe3d50
                                                          • Instruction ID: a6bbd8a5c9749c7570e1cb1a3b10eea71e5eb270400982301f120b351016d963
                                                          • Opcode Fuzzy Hash: a05c00ec4dbb63dc6042900f6502e5f2c001f692359ef839f3f88f686fbe3d50
                                                          • Instruction Fuzzy Hash: 1F322822D69F114DD7239634E872335A298AFB73D8F15DB37F819F5AA6EB28C4834110
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9f27d4dd17743843eaba73c8bc0190c7904170b34c4c3948be2dd8225960e39f
                                                          • Instruction ID: 4162fd0a803714766dd2f55e4f3b315e302c2e2a64b97d1e94a23309e8ac1129
                                                          • Opcode Fuzzy Hash: 9f27d4dd17743843eaba73c8bc0190c7904170b34c4c3948be2dd8225960e39f
                                                          • Instruction Fuzzy Hash: D1B1F121D2AF514DD72396398831336B78CAFBB6D5F51D71BFC1AB4E22EB2185834181
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __time64.LIBCMT ref: 00D68B25
                                                            • Part of subcall function 00D2543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00D691F8,00000000,?,?,?,?,00D693A9,00000000,?), ref: 00D25443
                                                            • Part of subcall function 00D2543A: __aulldiv.LIBCMT ref: 00D25463
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Time$FileSystem__aulldiv__time64
                                                          • String ID:
                                                          • API String ID: 2893107130-0
                                                          • Opcode ID: 6df02c28659b90560464ffcebf7d6a595c69a6178356a05588533b5955d959b2
                                                          • Instruction ID: bc89a6df0e50761eecbc7786e960e8117b99d76ac40617cd8e14151a15232367
                                                          • Opcode Fuzzy Hash: 6df02c28659b90560464ffcebf7d6a595c69a6178356a05588533b5955d959b2
                                                          • Instruction Fuzzy Hash: D221E4726356118FC329CF29D441A52B3E1EBA4311B288F6CE0E5CB2D0CA74B905DFA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 00D74218
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 2eac9bbc3b9ed3d24f63d3416dd988c8060d5cc9149b2be10eba24c4cd7ed4e5
                                                          • Instruction ID: f6b74cbee22514284d6ecb0038af53d01bc2192ea437fd472f4274e9f598e97b
                                                          • Opcode Fuzzy Hash: 2eac9bbc3b9ed3d24f63d3416dd988c8060d5cc9149b2be10eba24c4cd7ed4e5
                                                          • Instruction Fuzzy Hash: 06E01A312502149FD710AF69D845A9AF7E8EF947A0F008026F84DC7352EAB0E8408BB5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00D64EEC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: mouse_event
                                                          • String ID:
                                                          • API String ID: 2434400541-0
                                                          • Opcode ID: 0aae88d6c9e2c1bf3bb605272acec3024a34f0f4217eb1e549941c1e3c5a5592
                                                          • Instruction ID: aaefed2f6137774c4f16c175b27279b7635134e6d317d0b2871d5eecddca5966
                                                          • Opcode Fuzzy Hash: 0aae88d6c9e2c1bf3bb605272acec3024a34f0f4217eb1e549941c1e3c5a5592
                                                          • Instruction Fuzzy Hash: C1D09EA91607057BED584B249C5FF771109F301785FD8558AB542C91C3D8D2AC555131
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00D588D1), ref: 00D58CB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: LogonUser
                                                          • String ID:
                                                          • API String ID: 1244722697-0
                                                          • Opcode ID: 25cc2d777e849d5dc2c30857b50317c246ea122fd65ef31b894a27a4341dc093
                                                          • Instruction ID: e85468b7a302e73d4c7cd14090d50baca7e3e7b7a7c43de622b85991fd099b5a
                                                          • Opcode Fuzzy Hash: 25cc2d777e849d5dc2c30857b50317c246ea122fd65ef31b894a27a4341dc093
                                                          • Instruction Fuzzy Hash: 68D09E3226460EAFEF019FA4DD05EAE3B69EB04B01F408511FE15D51A1C775D935AB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 00D42242
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID:
                                                          • API String ID: 2645101109-0
                                                          • Opcode ID: 8e38a913f30620a3964935f700e3f6405e92242e4b1c5bc2e13e640458024d90
                                                          • Instruction ID: 321e5de6040dfdc89ec0835427437e65db536b3ddb471b272921bea0e6caba3d
                                                          • Opcode Fuzzy Hash: 8e38a913f30620a3964935f700e3f6405e92242e4b1c5bc2e13e640458024d90
                                                          • Instruction Fuzzy Hash: F5C04CF5810109DBDB05DB90D988DEE77BCAB04304F104055A141F2100D7749B448B71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00D2A36A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: cb75ad7ee9da11a268fb9b3978e793a3cd32550ac5e6d4d9eaa86fae4ff198ff
                                                          • Instruction ID: 805112f0e5f7b9f8793aab0837f30b482fd0a18f446497c32232c8406b5e81ac
                                                          • Opcode Fuzzy Hash: cb75ad7ee9da11a268fb9b3978e793a3cd32550ac5e6d4d9eaa86fae4ff198ff
                                                          • Instruction Fuzzy Hash: 3FA0123001020CA78A001B41EC044547F5CD6011907004020F40CC0121873254104690
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5fd94757ad1639b4acdbe01903f3d20d9ee67f87e2bbe813f4563116a0357bad
                                                          • Instruction ID: 8f0f80824a4acbd111293985d12514e34dbbecd07feea9f7a481587d7ce9e187
                                                          • Opcode Fuzzy Hash: 5fd94757ad1639b4acdbe01903f3d20d9ee67f87e2bbe813f4563116a0357bad
                                                          • Instruction Fuzzy Hash: F6222530905656EBDF29CA14F0A46BE77A2EB41311F6C446ADC828B295DF30DDC5EBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                          • Instruction ID: a6fbaaeb3b0706b2cbba23e9b8d5cbf6993441a3d0bdd9f7efbe624808c99f5c
                                                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                          • Instruction Fuzzy Hash: 77C17F372090B309DB2D8639A57413EBAE15EB27B531E476DF4B2CB5C4EF20D564A630
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                          • Instruction ID: ecd98a87a13b2380be0c78d058a03ecbc3f2dd251d1d707d2084fb3228066482
                                                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                          • Instruction Fuzzy Hash: 81C18E372051B30ADB2D863AA53403EBAE15EB27B531E076DF4B2DB5D4EF20D524A630
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction ID: 85dbaa5df4c7a5c5df06e3956aafe6c3914702de1e7f6c8b899cdd34de8f27e7
                                                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction Fuzzy Hash: 58C1623B2051B309DF2D863AA53413EBAE15EB27B531E876DE4B2CB5D4EF20D5249630
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689593066.0000000001680000.00000040.00001000.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1680000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                          • Instruction ID: d6e20c69c896c46471d702754604f556eb1f02aeb045d0ebd994111497f11988
                                                          • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                          • Instruction Fuzzy Hash: 3341D371D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689593066.0000000001680000.00000040.00001000.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1680000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                          • Instruction ID: 6f7a26ae39816e5597f28836bd0f68bbaff982b4501e456b9cf26280a5535879
                                                          • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                          • Instruction Fuzzy Hash: F3019278A01109EFCB48EF98C5909AEF7B5FB48710F208699D909A7301E730EE51DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689593066.0000000001680000.00000040.00001000.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1680000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                          • Instruction ID: 2367712829834bd86000e893c5dd53295fa4d8357b18bf47c1ec6804118df8ba
                                                          • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                          • Instruction Fuzzy Hash: 72019278A01109EFCB44EF98C5909AEF7B5FB48710F208699D809A7301D730EE51DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689593066.0000000001680000.00000040.00001000.00020000.00000000.sdmp, Offset: 01680000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1680000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                          • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                          • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                          • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00D77B70
                                                          • DeleteObject.GDI32(00000000), ref: 00D77B82
                                                          • DestroyWindow.USER32 ref: 00D77B90
                                                          • GetDesktopWindow.USER32 ref: 00D77BAA
                                                          • GetWindowRect.USER32(00000000), ref: 00D77BB1
                                                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00D77CF2
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00D77D02
                                                          • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D77D4A
                                                          • GetClientRect.USER32(00000000,?), ref: 00D77D56
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00D77D90
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D77DB2
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D77DC5
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D77DD0
                                                          • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D77DD9
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D77DE8
                                                          • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D77DF1
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D77DF8
                                                          • GlobalFree.KERNEL32(00000000), ref: 00D77E03
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D77E15
                                                          • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00D92CAC,00000000), ref: 00D77E2B
                                                          • GlobalFree.KERNEL32(00000000), ref: 00D77E3B
                                                          • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00D77E61
                                                          • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00D77E80
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D77EA2
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D7808F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: 84070f7cc5a657cee341610109374ba9f1793afebc540d5f7f4086c905533692
                                                          • Instruction ID: 4c943b6d4af3de0f891d1b125ab5b0e7195df1bc83b359b81aec92f3bd4b761e
                                                          • Opcode Fuzzy Hash: 84070f7cc5a657cee341610109374ba9f1793afebc540d5f7f4086c905533692
                                                          • Instruction Fuzzy Hash: A9026B71910215AFDB14DFA8DC89EAEBBB9EF48310F148558F909EB2A1DB709D01CB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,00D8F910), ref: 00D838AF
                                                          • IsWindowVisible.USER32(?), ref: 00D838D3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpperVisibleWindow
                                                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                          • API String ID: 4105515805-45149045
                                                          • Opcode ID: 3a01ae4fa8ec92d6b8f27f1233037050b14d0a881ff8dc9a56b8b5e559f84acd
                                                          • Instruction ID: 24649892418525baf5b7cdeb28995902a8dd641424851b567d565f774aa74f04
                                                          • Opcode Fuzzy Hash: 3a01ae4fa8ec92d6b8f27f1233037050b14d0a881ff8dc9a56b8b5e559f84acd
                                                          • Instruction Fuzzy Hash: EDD15A30204215DFCB14FF24C451AAABBA5EF94754F144859BC8A5B3A3DB71EE0ACB71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 00D8A89F
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00D8A8D0
                                                          • GetSysColor.USER32(0000000F), ref: 00D8A8DC
                                                          • SetBkColor.GDI32(?,000000FF), ref: 00D8A8F6
                                                          • SelectObject.GDI32(?,?), ref: 00D8A905
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00D8A930
                                                          • GetSysColor.USER32(00000010), ref: 00D8A938
                                                          • CreateSolidBrush.GDI32(00000000), ref: 00D8A93F
                                                          • FrameRect.USER32(?,?,00000000), ref: 00D8A94E
                                                          • DeleteObject.GDI32(00000000), ref: 00D8A955
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00D8A9A0
                                                          • FillRect.USER32(?,?,?), ref: 00D8A9D2
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D8A9FD
                                                            • Part of subcall function 00D8AB60: GetSysColor.USER32(00000012), ref: 00D8AB99
                                                            • Part of subcall function 00D8AB60: SetTextColor.GDI32(?,?), ref: 00D8AB9D
                                                            • Part of subcall function 00D8AB60: GetSysColorBrush.USER32(0000000F), ref: 00D8ABB3
                                                            • Part of subcall function 00D8AB60: GetSysColor.USER32(0000000F), ref: 00D8ABBE
                                                            • Part of subcall function 00D8AB60: GetSysColor.USER32(00000011), ref: 00D8ABDB
                                                            • Part of subcall function 00D8AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00D8ABE9
                                                            • Part of subcall function 00D8AB60: SelectObject.GDI32(?,00000000), ref: 00D8ABFA
                                                            • Part of subcall function 00D8AB60: SetBkColor.GDI32(?,00000000), ref: 00D8AC03
                                                            • Part of subcall function 00D8AB60: SelectObject.GDI32(?,?), ref: 00D8AC10
                                                            • Part of subcall function 00D8AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00D8AC2F
                                                            • Part of subcall function 00D8AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00D8AC46
                                                            • Part of subcall function 00D8AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00D8AC5B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                          • String ID:
                                                          • API String ID: 4124339563-0
                                                          • Opcode ID: 1e1f98dd6ddb1ad8270b5e802e970cba522b5135d2f8e6c163a8358fe3929642
                                                          • Instruction ID: 63f5b6fd1ee16668914d5d61661b2916b436bdd5e8d6a04f772c2a47bd29f12c
                                                          • Opcode Fuzzy Hash: 1e1f98dd6ddb1ad8270b5e802e970cba522b5135d2f8e6c163a8358fe3929642
                                                          • Instruction Fuzzy Hash: 17A18F72018301BFD710AF68DC08E5B7BA9FF89721F144A2AF962D62E0D774D945CB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?), ref: 00D02CA2
                                                          • DeleteObject.GDI32(00000000), ref: 00D02CE8
                                                          • DeleteObject.GDI32(00000000), ref: 00D02CF3
                                                          • DestroyIcon.USER32(00000000,?,?,?), ref: 00D02CFE
                                                          • DestroyWindow.USER32(00000000,?,?,?), ref: 00D02D09
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00D3C68B
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00D3C6C4
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00D3CAED
                                                            • Part of subcall function 00D01B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00D02036,?,00000000,?,?,?,?,00D016CB,00000000,?), ref: 00D01B9A
                                                          • SendMessageW.USER32(?,00001053), ref: 00D3CB2A
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00D3CB41
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00D3CB57
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00D3CB62
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 464785882-4108050209
                                                          • Opcode ID: 61dd32dee53eac0f4e8dc816992a36e4c76997f1945e8568621b67be335af047
                                                          • Instruction ID: 37c0a46168c541aed3ba59a07b20924dac42d8ce7ef7220263ee16f2e3106b46
                                                          • Opcode Fuzzy Hash: 61dd32dee53eac0f4e8dc816992a36e4c76997f1945e8568621b67be335af047
                                                          • Instruction Fuzzy Hash: E2129C30611201EFDB20CF24C889BA9B7E5FF05315F585569E889EB2A2C731EC51CBB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 00D777F1
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00D778B0
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00D778EE
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00D77900
                                                          • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00D77946
                                                          • GetClientRect.USER32(00000000,?), ref: 00D77952
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00D77996
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00D779A5
                                                          • GetStockObject.GDI32(00000011), ref: 00D779B5
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00D779B9
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00D779C9
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D779D2
                                                          • DeleteDC.GDI32(00000000), ref: 00D779DB
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00D77A07
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00D77A1E
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00D77A59
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00D77A6D
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00D77A7E
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00D77AAE
                                                          • GetStockObject.GDI32(00000011), ref: 00D77AB9
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00D77AC4
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00D77ACE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: b681f2e2433566eee461dfbf9021140dfc823961af90e1c461f2b49f0d42bd8d
                                                          • Instruction ID: 9447d4dfa36f99ebe8afab1be06356b78f995d2f5303d53b85a9142d7904abdc
                                                          • Opcode Fuzzy Hash: b681f2e2433566eee461dfbf9021140dfc823961af90e1c461f2b49f0d42bd8d
                                                          • Instruction Fuzzy Hash: CFA16071A50215BFEB149BA4DC4AFAEBBB9EB48710F108514FA15E72E0D770AD01CB74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00D6AF89
                                                          • GetDriveTypeW.KERNEL32(?,00D8FAC0,?,\\.\,00D8F910), ref: 00D6B066
                                                          • SetErrorMode.KERNEL32(00000000,00D8FAC0,?,\\.\,00D8F910), ref: 00D6B1C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: 7c7656598cca1f84c147bd5cfe2363cdb5bbd1af19df522a4388d08af26f97e6
                                                          • Instruction ID: 164406793da9514100db0f27661338ff86f1f5c216e6befe743a6bb37124fb38
                                                          • Opcode Fuzzy Hash: 7c7656598cca1f84c147bd5cfe2363cdb5bbd1af19df522a4388d08af26f97e6
                                                          • Instruction Fuzzy Hash: 4F519030684305FFCB10EF18C9A29BD77B0EB263617244017E44BEB291DB69ED859B72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 1038674560-86951937
                                                          • Opcode ID: ffb8af273e09b79499bce88f3f137e8955b66c4efdbe1d0469cc1341b312d4c4
                                                          • Instruction ID: b3f073d46f85da89b88b60445d145997fe19ae6b4e0c5644574b875f18bf86e1
                                                          • Opcode Fuzzy Hash: ffb8af273e09b79499bce88f3f137e8955b66c4efdbe1d0469cc1341b312d4c4
                                                          • Instruction Fuzzy Hash: A381D8B1740355BACB20BB64DD82FBF7768EF24704F084025FD49AA1C2EB64EA55C6B1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 00D8AB99
                                                          • SetTextColor.GDI32(?,?), ref: 00D8AB9D
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00D8ABB3
                                                          • GetSysColor.USER32(0000000F), ref: 00D8ABBE
                                                          • CreateSolidBrush.GDI32(?), ref: 00D8ABC3
                                                          • GetSysColor.USER32(00000011), ref: 00D8ABDB
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00D8ABE9
                                                          • SelectObject.GDI32(?,00000000), ref: 00D8ABFA
                                                          • SetBkColor.GDI32(?,00000000), ref: 00D8AC03
                                                          • SelectObject.GDI32(?,?), ref: 00D8AC10
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00D8AC2F
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00D8AC46
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00D8AC5B
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00D8ACA7
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00D8ACCE
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00D8ACEC
                                                          • DrawFocusRect.USER32(?,?), ref: 00D8ACF7
                                                          • GetSysColor.USER32(00000011), ref: 00D8AD05
                                                          • SetTextColor.GDI32(?,00000000), ref: 00D8AD0D
                                                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00D8AD21
                                                          • SelectObject.GDI32(?,00D8A869), ref: 00D8AD38
                                                          • DeleteObject.GDI32(?), ref: 00D8AD43
                                                          • SelectObject.GDI32(?,?), ref: 00D8AD49
                                                          • DeleteObject.GDI32(?), ref: 00D8AD4E
                                                          • SetTextColor.GDI32(?,?), ref: 00D8AD54
                                                          • SetBkColor.GDI32(?,?), ref: 00D8AD5E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: 02388ad8ea80d3e1421ba924a59dfc356c9cabb790a9aaf8a202fc9df6fad69b
                                                          • Instruction ID: ac5eabaec973ccac43be0c972cf1a57f7dea26150b436e5e5923583c5735bdab
                                                          • Opcode Fuzzy Hash: 02388ad8ea80d3e1421ba924a59dfc356c9cabb790a9aaf8a202fc9df6fad69b
                                                          • Instruction Fuzzy Hash: 68615E71910218EFEF119FA8DC48EAE7B79EB08720F244126F915EB2A1D7759D40DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00D88D34
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00D88D45
                                                          • CharNextW.USER32(0000014E), ref: 00D88D74
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00D88DB5
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00D88DCB
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00D88DDC
                                                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00D88DF9
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 00D88E45
                                                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00D88E5B
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00D88E8C
                                                          • _memset.LIBCMT ref: 00D88EB1
                                                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00D88EFA
                                                          • _memset.LIBCMT ref: 00D88F59
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00D88F83
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00D88FDB
                                                          • SendMessageW.USER32(?,0000133D,?,?), ref: 00D89088
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00D890AA
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00D890F4
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00D89121
                                                          • DrawMenuBar.USER32(?), ref: 00D89130
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 00D89158
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                          • String ID: 0
                                                          • API String ID: 1073566785-4108050209
                                                          • Opcode ID: 9565dab8f46d51b8b771ef75f5ed51686b7ebabefc3a9e659e1bf4c1d62aa9e0
                                                          • Instruction ID: 5ddc6c87858c843d6ac3a399bcc030817aa6d3af0eb2a4ddeee15df906abbf00
                                                          • Opcode Fuzzy Hash: 9565dab8f46d51b8b771ef75f5ed51686b7ebabefc3a9e659e1bf4c1d62aa9e0
                                                          • Instruction Fuzzy Hash: AAE18070900219AFDF20AF55CC88EFEBBB9EF15710F548159F955AA290DB708A81DF70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00D84C51
                                                          • GetDesktopWindow.USER32 ref: 00D84C66
                                                          • GetWindowRect.USER32(00000000), ref: 00D84C6D
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D84CCF
                                                          • DestroyWindow.USER32(?), ref: 00D84CFB
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00D84D24
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00D84D42
                                                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00D84D68
                                                          • SendMessageW.USER32(?,00000421,?,?), ref: 00D84D7D
                                                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00D84D90
                                                          • IsWindowVisible.USER32(?), ref: 00D84DB0
                                                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00D84DCB
                                                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00D84DDF
                                                          • GetWindowRect.USER32(?,?), ref: 00D84DF7
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00D84E1D
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00D84E37
                                                          • CopyRect.USER32(?,?), ref: 00D84E4E
                                                          • SendMessageW.USER32(?,00000412,00000000), ref: 00D84EB9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: 3c572a274d13054b4cbc41f07f1f30496c9cd43526dfedfbc69c604991e818cf
                                                          • Instruction ID: 2833d8e4f25d96a936d87e2fbbfdf05d71083fa1b036f33599758830cfeea73d
                                                          • Opcode Fuzzy Hash: 3c572a274d13054b4cbc41f07f1f30496c9cd43526dfedfbc69c604991e818cf
                                                          • Instruction Fuzzy Hash: 3FB17B71614341AFDB04EF64C849B6ABBE4FF88310F048A1DF5999B2A2D771EC04CBA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00D028BC
                                                          • GetSystemMetrics.USER32(00000007), ref: 00D028C4
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00D028EF
                                                          • GetSystemMetrics.USER32(00000008), ref: 00D028F7
                                                          • GetSystemMetrics.USER32(00000004), ref: 00D0291C
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00D02939
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00D02949
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00D0297C
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00D02990
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 00D029AE
                                                          • GetStockObject.GDI32(00000011), ref: 00D029CA
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00D029D5
                                                            • Part of subcall function 00D02344: GetCursorPos.USER32(?), ref: 00D02357
                                                            • Part of subcall function 00D02344: ScreenToClient.USER32(00DC67B0,?), ref: 00D02374
                                                            • Part of subcall function 00D02344: GetAsyncKeyState.USER32(00000001), ref: 00D02399
                                                            • Part of subcall function 00D02344: GetAsyncKeyState.USER32(00000002), ref: 00D023A7
                                                          • SetTimer.USER32(00000000,00000000,00000028,00D01256), ref: 00D029FC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: 6a9a6c6448193d8a69d9e0e4a62932e271ddcd864b365f56addb2c49ae011787
                                                          • Instruction ID: 4d24c27946671fb9873936a0710651ae9677bdcc9bd27bce664b2a3d96aa44f1
                                                          • Opcode Fuzzy Hash: 6a9a6c6448193d8a69d9e0e4a62932e271ddcd864b365f56addb2c49ae011787
                                                          • Instruction Fuzzy Hash: 7EB13B7561120AAFDB14DF68DC49BAE7BA4FB08314F108529FA15E72D0DB74E850CB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00D840F6
                                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00D841B6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                          • API String ID: 3974292440-719923060
                                                          • Opcode ID: cc8170f27e50c8326afe9e51038498821d238318dc73adeadf0ffeb66b55a1fb
                                                          • Instruction ID: a39c211499a762b5b83dccdb1ca746c800dfb05a34a38d2ca64260ef5298e1cb
                                                          • Opcode Fuzzy Hash: cc8170f27e50c8326afe9e51038498821d238318dc73adeadf0ffeb66b55a1fb
                                                          • Instruction Fuzzy Hash: 8CA158302142029FCB14FF24C961B6AB7A5EF94314F144969B8AA9B7D3DB70ED09CB71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 00D75309
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00D75314
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00D7531F
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00D7532A
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00D75335
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 00D75340
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 00D7534B
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 00D75356
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 00D75361
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 00D7536C
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 00D75377
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00D75382
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 00D7538D
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00D75398
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 00D753A3
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00D753AE
                                                          • GetCursorInfo.USER32(?), ref: 00D753BE
                                                          • GetLastError.KERNEL32(00000001,00000000), ref: 00D753E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$ErrorInfoLast
                                                          • String ID:
                                                          • API String ID: 3215588206-0
                                                          • Opcode ID: e218680c66f6ed468962eeaa74b72ebb1132a47f28e871ef391ce440a49833bb
                                                          • Instruction ID: a76ed7e025f1d9c686f2ff5a57db9e790ae5faf5601415021768047f9a7c5da6
                                                          • Opcode Fuzzy Hash: e218680c66f6ed468962eeaa74b72ebb1132a47f28e871ef391ce440a49833bb
                                                          • Instruction Fuzzy Hash: AD415170E043196ADB109FBA9C4996EFFF8EF51B50B10452FE509E7291DAB8A4018E61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00D5AAA5
                                                          • __swprintf.LIBCMT ref: 00D5AB46
                                                          • _wcscmp.LIBCMT ref: 00D5AB59
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00D5ABAE
                                                          • _wcscmp.LIBCMT ref: 00D5ABEA
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00D5AC21
                                                          • GetDlgCtrlID.USER32(?), ref: 00D5AC73
                                                          • GetWindowRect.USER32(?,?), ref: 00D5ACA9
                                                          • GetParent.USER32(?), ref: 00D5ACC7
                                                          • ScreenToClient.USER32(00000000), ref: 00D5ACCE
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00D5AD48
                                                          • _wcscmp.LIBCMT ref: 00D5AD5C
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00D5AD82
                                                          • _wcscmp.LIBCMT ref: 00D5AD96
                                                            • Part of subcall function 00D2386C: _iswctype.LIBCMT ref: 00D23874
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                          • String ID: %s%u
                                                          • API String ID: 3744389584-679674701
                                                          • Opcode ID: 6b48cf0cde4c1606b0736a30864653941e4d7a6db3c54a09b57e8e04eaeaf299
                                                          • Instruction ID: 7d2e308070b3606d1172b9c4e4951e964b06dbcf3ef141dee40e7d1868dfead0
                                                          • Opcode Fuzzy Hash: 6b48cf0cde4c1606b0736a30864653941e4d7a6db3c54a09b57e8e04eaeaf299
                                                          • Instruction Fuzzy Hash: FAA19671204316AFDB14DF28C884BAAB7E8FF04356F14462AFD99D2150E730E959CBB2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetClassNameW.USER32(00000008,?,00000400), ref: 00D5B3DB
                                                          • _wcscmp.LIBCMT ref: 00D5B3EC
                                                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 00D5B414
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 00D5B431
                                                          • _wcscmp.LIBCMT ref: 00D5B44F
                                                          • _wcsstr.LIBCMT ref: 00D5B460
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00D5B498
                                                          • _wcscmp.LIBCMT ref: 00D5B4A8
                                                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 00D5B4CF
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00D5B518
                                                          • _wcscmp.LIBCMT ref: 00D5B528
                                                          • GetClassNameW.USER32(00000010,?,00000400), ref: 00D5B550
                                                          • GetWindowRect.USER32(00000004,?), ref: 00D5B5B9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                          • String ID: @$ThumbnailClass
                                                          • API String ID: 1788623398-1539354611
                                                          • Opcode ID: 8b628273b013eb7dac8c7ddfb7582a79bbca0575cf027d6882eddd93c059cd00
                                                          • Instruction ID: 825e5d742aff11a2db10e9dbbc64acb990b6e5f79b5bcc7344b19c3023c49c3d
                                                          • Opcode Fuzzy Hash: 8b628273b013eb7dac8c7ddfb7582a79bbca0575cf027d6882eddd93c059cd00
                                                          • Instruction Fuzzy Hash: F5819C710083059BDF14DF10D885FAA7BE8EF5432AF18856AFD899A092EB34DD49CB71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                          • API String ID: 1038674560-1810252412
                                                          • Opcode ID: 22eeca4e149c7505a8ef6d39d4ef02e779af52a65771af2def23aa7b68f4cb29
                                                          • Instruction ID: 9cb509b471f32f66b82db8725387de54cac733ee4a67b9001886a359e91b1331
                                                          • Opcode Fuzzy Hash: 22eeca4e149c7505a8ef6d39d4ef02e779af52a65771af2def23aa7b68f4cb29
                                                          • Instruction Fuzzy Hash: 0031AD30A04245EADF14FA60DD53FEEB7A4DF24761F60002ABD46750D2EF61AE08CA75
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 00D5C4D4
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00D5C4E6
                                                          • SetWindowTextW.USER32(?,?), ref: 00D5C4FD
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00D5C512
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00D5C518
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00D5C528
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00D5C52E
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00D5C54F
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00D5C569
                                                          • GetWindowRect.USER32(?,?), ref: 00D5C572
                                                          • SetWindowTextW.USER32(?,?), ref: 00D5C5DD
                                                          • GetDesktopWindow.USER32 ref: 00D5C5E3
                                                          • GetWindowRect.USER32(00000000), ref: 00D5C5EA
                                                          • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00D5C636
                                                          • GetClientRect.USER32(?,?), ref: 00D5C643
                                                          • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00D5C668
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00D5C693
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                          • String ID:
                                                          • API String ID: 3869813825-0
                                                          • Opcode ID: 435770b67ff5afda3dfe46fe219e887a5fe3bfee9d8199bd0aa666625219ad15
                                                          • Instruction ID: 51ddbcc77a203a08292cc79d54a92558b429a5f5ec9b81853814cf6d13a99a1d
                                                          • Opcode Fuzzy Hash: 435770b67ff5afda3dfe46fe219e887a5fe3bfee9d8199bd0aa666625219ad15
                                                          • Instruction Fuzzy Hash: C3516170910709AFDB20DFA8DD85B6EBBF5FF04705F004528EA86A26A0D774F955CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D8A4C8
                                                          • DestroyWindow.USER32(?,?), ref: 00D8A542
                                                            • Part of subcall function 00D07D2C: _memmove.LIBCMT ref: 00D07D66
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00D8A5BC
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00D8A5DE
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00D8A5F1
                                                          • DestroyWindow.USER32(00000000), ref: 00D8A613
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00D00000,00000000), ref: 00D8A64A
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00D8A663
                                                          • GetDesktopWindow.USER32 ref: 00D8A67C
                                                          • GetWindowRect.USER32(00000000), ref: 00D8A683
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00D8A69B
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00D8A6B3
                                                            • Part of subcall function 00D025DB: GetWindowLongW.USER32(?,000000EB), ref: 00D025EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 1297703922-3619404913
                                                          • Opcode ID: 7068ef7a3d1adaa2b06fe2ed9d69cb46804546bae6e93d7841226a31488909dc
                                                          • Instruction ID: 772bff63f6777554a4db7df3cb7f3e7fed17000ac55d1fed5553769d4d487a3a
                                                          • Opcode Fuzzy Hash: 7068ef7a3d1adaa2b06fe2ed9d69cb46804546bae6e93d7841226a31488909dc
                                                          • Instruction Fuzzy Hash: 21715871150705AFE721DF28C84AF6A77E5FB98304F08492EF985872A0E770E946CB32
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D02612: GetWindowLongW.USER32(?,000000EB), ref: 00D02623
                                                          • DragQueryPoint.SHELL32(?,?), ref: 00D8C917
                                                            • Part of subcall function 00D8ADF1: ClientToScreen.USER32(?,?), ref: 00D8AE1A
                                                            • Part of subcall function 00D8ADF1: GetWindowRect.USER32(?,?), ref: 00D8AE90
                                                            • Part of subcall function 00D8ADF1: PtInRect.USER32(?,?,00D8C304), ref: 00D8AEA0
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00D8C980
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00D8C98B
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00D8C9AE
                                                          • _wcscat.LIBCMT ref: 00D8C9DE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00D8C9F5
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00D8CA0E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00D8CA25
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00D8CA47
                                                          • DragFinish.SHELL32(?), ref: 00D8CA4E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00D8CB41
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                          • API String ID: 169749273-3440237614
                                                          • Opcode ID: 6d1304b4534aaa9531f7bf4456934db4b59ae4dbcb1706eade25069ca2750788
                                                          • Instruction ID: 0508027b9ff32e8b6acb61574d125a1f2f1d9315207dda9ad51df244571e2f9c
                                                          • Opcode Fuzzy Hash: 6d1304b4534aaa9531f7bf4456934db4b59ae4dbcb1706eade25069ca2750788
                                                          • Instruction Fuzzy Hash: 96614C71118301AFC701EF64DC85E9BBBE8EF88710F400A1EF595972A1DB709A49CB72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00D846AB
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00D846F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 3974292440-4258414348
                                                          • Opcode ID: a9e39343da117b7e3e15db244ab4dd6a20ff2be341c7ce43a4268537cb88f0da
                                                          • Instruction ID: 54a9305b1f7a3038e5f8f0b288b5b7f4047c72f69024fbf3af6854c65781aded
                                                          • Opcode Fuzzy Hash: a9e39343da117b7e3e15db244ab4dd6a20ff2be341c7ce43a4268537cb88f0da
                                                          • Instruction Fuzzy Hash: DB9139342047129FCB14FF24C851A6ABBA1EF94314F04485DE89A5B7A3DB74ED4ACBB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00D8BB6E
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00D86D80,?), ref: 00D8BBCA
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00D8BC03
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00D8BC46
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00D8BC7D
                                                          • FreeLibrary.KERNEL32(?), ref: 00D8BC89
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00D8BC99
                                                          • DestroyIcon.USER32(?), ref: 00D8BCA8
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00D8BCC5
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00D8BCD1
                                                            • Part of subcall function 00D2313D: __wcsicmp_l.LIBCMT ref: 00D231C6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 1212759294-1154884017
                                                          • Opcode ID: 5d8efaf3ad848845b6a0ce062d3341f2a4f60719c64ed7bbb863d7c13bba43dc
                                                          • Instruction ID: 3da72f5f7ea5a56428a63930c5567238cabbb74a89280367d1015e30f528c021
                                                          • Opcode Fuzzy Hash: 5d8efaf3ad848845b6a0ce062d3341f2a4f60719c64ed7bbb863d7c13bba43dc
                                                          • Instruction Fuzzy Hash: F761CEB1600619BAEB14EF74DC45FBE7BA8EB08720F10411AF815D61D1DBB4AA90DBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D09997: __itow.LIBCMT ref: 00D099C2
                                                            • Part of subcall function 00D09997: __swprintf.LIBCMT ref: 00D09A0C
                                                          • CharLowerBuffW.USER32(?,?), ref: 00D6A636
                                                          • GetDriveTypeW.KERNEL32 ref: 00D6A683
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D6A6CB
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D6A702
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D6A730
                                                            • Part of subcall function 00D07D2C: _memmove.LIBCMT ref: 00D07D66
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 2698844021-4113822522
                                                          • Opcode ID: 5a1e3f9439730904069924d4d33484c916fdd34bd6fe53a50910fa816473ed26
                                                          • Instruction ID: ea9bb7e60df0394e53652227ef2fd31a775fc2ea2cc931c24d1f7ee20770709f
                                                          • Opcode Fuzzy Hash: 5a1e3f9439730904069924d4d33484c916fdd34bd6fe53a50910fa816473ed26
                                                          • Instruction Fuzzy Hash: E5515A715047059FC700EF24C89196AB7E4EF94718F04496CF88A9B2A2DB31AE0ACF72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00D6A47A
                                                          • __swprintf.LIBCMT ref: 00D6A49C
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00D6A4D9
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00D6A4FE
                                                          • _memset.LIBCMT ref: 00D6A51D
                                                          • _wcsncpy.LIBCMT ref: 00D6A559
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00D6A58E
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D6A599
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 00D6A5A2
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D6A5AC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 2733774712-3457252023
                                                          • Opcode ID: 05ee5929389f295ac1eceaaf5ff9a4e68316ce465b288b64d856810a8228965d
                                                          • Instruction ID: 1356101b1508920cca4315f21997d541fc01eb77787dfd91cad5bb65a86b99f3
                                                          • Opcode Fuzzy Hash: 05ee5929389f295ac1eceaaf5ff9a4e68316ce465b288b64d856810a8228965d
                                                          • Instruction Fuzzy Hash: E931AEB5500219ABDB20DFA4DC48FEB73BCEF88701F1441B6FA09E2160EB7096448B35
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                                                          • String ID:
                                                          • API String ID: 884005220-0
                                                          • Opcode ID: 86f2b8f6a85e979b71ef628aa236c65367ce54ee6a4d066a2b62f589f70579c3
                                                          • Instruction ID: bf79454512864f0168076ee32df85944b944eaa20d7e33ca8cb6c7d59c8b6687
                                                          • Opcode Fuzzy Hash: 86f2b8f6a85e979b71ef628aa236c65367ce54ee6a4d066a2b62f589f70579c3
                                                          • Instruction Fuzzy Hash: 0C610972A04316AFDB105F2CEC41B6AB7A5EF21325F184116E8C1DB2D1EB79D940C772
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D02612: GetWindowLongW.USER32(?,000000EB), ref: 00D02623
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00D8C4EC
                                                          • GetFocus.USER32 ref: 00D8C4FC
                                                          • GetDlgCtrlID.USER32(00000000), ref: 00D8C507
                                                          • _memset.LIBCMT ref: 00D8C632
                                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00D8C65D
                                                          • GetMenuItemCount.USER32(?), ref: 00D8C67D
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00D8C690
                                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00D8C6C4
                                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00D8C70C
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00D8C744
                                                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00D8C779
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                          • String ID: 0
                                                          • API String ID: 1296962147-4108050209
                                                          • Opcode ID: 457f6a67ef8f4941d7e8b4982d28e8314fd59570f35b5ebec9e710ecff3b1bba
                                                          • Instruction ID: b4cb4996ffdb1c13b9bd5b4158f06bfaf7dff99892aac7bda0e179bc0d7faba8
                                                          • Opcode Fuzzy Hash: 457f6a67ef8f4941d7e8b4982d28e8314fd59570f35b5ebec9e710ecff3b1bba
                                                          • Instruction Fuzzy Hash: 1F816A70218305EFDB10EF24C985A6BBBE8FB88314F14592DF995972A1D770E905CBB2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D5874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D58766
                                                            • Part of subcall function 00D5874A: GetLastError.KERNEL32(?,00D5822A,?,?,?), ref: 00D58770
                                                            • Part of subcall function 00D5874A: GetProcessHeap.KERNEL32(00000008,?,?,00D5822A,?,?,?), ref: 00D5877F
                                                            • Part of subcall function 00D5874A: HeapAlloc.KERNEL32(00000000,?,00D5822A,?,?,?), ref: 00D58786
                                                            • Part of subcall function 00D5874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D5879D
                                                            • Part of subcall function 00D587E7: GetProcessHeap.KERNEL32(00000008,00D58240,00000000,00000000,?,00D58240,?), ref: 00D587F3
                                                            • Part of subcall function 00D587E7: HeapAlloc.KERNEL32(00000000,?,00D58240,?), ref: 00D587FA
                                                            • Part of subcall function 00D587E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00D58240,?), ref: 00D5880B
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00D58458
                                                          • _memset.LIBCMT ref: 00D5846D
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00D5848C
                                                          • GetLengthSid.ADVAPI32(?), ref: 00D5849D
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00D584DA
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00D584F6
                                                          • GetLengthSid.ADVAPI32(?), ref: 00D58513
                                                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00D58522
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00D58529
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00D5854A
                                                          • CopySid.ADVAPI32(00000000), ref: 00D58551
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00D58582
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00D585A8
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00D585BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                          • String ID:
                                                          • API String ID: 3996160137-0
                                                          • Opcode ID: 54e7781208542044f78f2856d0bcc3b2ca4fece769d0c8d0fd7817383e9575eb
                                                          • Instruction ID: 54f053f65704b78ee7ddfe82ae6a1fbdbf356779a6f1c43e8dc2e824c7a27c43
                                                          • Opcode Fuzzy Hash: 54e7781208542044f78f2856d0bcc3b2ca4fece769d0c8d0fd7817383e9575eb
                                                          • Instruction Fuzzy Hash: C661167190020AAFDF109FA4DC45AAEBBB9FF04306F148169ED15E7291EB319A19DF70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00D776A2
                                                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00D776AE
                                                          • CreateCompatibleDC.GDI32(?), ref: 00D776BA
                                                          • SelectObject.GDI32(00000000,?), ref: 00D776C7
                                                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00D7771B
                                                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00D77757
                                                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00D7777B
                                                          • SelectObject.GDI32(00000006,?), ref: 00D77783
                                                          • DeleteObject.GDI32(?), ref: 00D7778C
                                                          • DeleteDC.GDI32(00000006), ref: 00D77793
                                                          • ReleaseDC.USER32(00000000,?), ref: 00D7779E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: 406f23a995fd9e80ac450de0738555fd98f55ff0e240a24bc2e3c669dbcf1b96
                                                          • Instruction ID: e51ea758d41bc2221c8ca425e994d5782d9d52023485ae390691c5d885fbbe03
                                                          • Opcode Fuzzy Hash: 406f23a995fd9e80ac450de0738555fd98f55ff0e240a24bc2e3c669dbcf1b96
                                                          • Instruction Fuzzy Hash: 7E512875904309EFCB15CFA8CC85EAEBBB9EF48710F14852DE949D7350D631A940CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00D8FB78), ref: 00D6A0FC
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                          • LoadStringW.USER32(?,?,00000FFF,?), ref: 00D6A11E
                                                          • __swprintf.LIBCMT ref: 00D6A177
                                                          • __swprintf.LIBCMT ref: 00D6A190
                                                          • _wprintf.LIBCMT ref: 00D6A246
                                                          • _wprintf.LIBCMT ref: 00D6A264
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: LoadString__swprintf_wprintf$_memmove
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 311963372-2391861430
                                                          • Opcode ID: fb189d0081b337485b6fd33a6a420f1654d146fad65f20673aedfb3b31df52b2
                                                          • Instruction ID: a513912975dff2075f92c644a927d86572487e26431b2f130693d594baf984c1
                                                          • Opcode Fuzzy Hash: fb189d0081b337485b6fd33a6a420f1654d146fad65f20673aedfb3b31df52b2
                                                          • Instruction Fuzzy Hash: 2F516C7190020AABCF15EBA4CD92EEEB779EF18300F140165B509B61A1EB356F58CFB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D20B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00D06C6C,?,00008000), ref: 00D20BB7
                                                            • Part of subcall function 00D048AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D048A1,?,?,00D037C0,?), ref: 00D048CE
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00D06D0D
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00D06E5A
                                                            • Part of subcall function 00D059CD: _wcscpy.LIBCMT ref: 00D05A05
                                                            • Part of subcall function 00D2387D: _iswctype.LIBCMT ref: 00D23885
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                          • API String ID: 537147316-1018226102
                                                          • Opcode ID: 718451e364eb87e21c94a58ae79a6b11d1ee50e2efeceba51433eae169f8d5ee
                                                          • Instruction ID: 942b42ef460a3e484c240340751e5ee1e3df7e3c15776b6291ed3d6a210fefad
                                                          • Opcode Fuzzy Hash: 718451e364eb87e21c94a58ae79a6b11d1ee50e2efeceba51433eae169f8d5ee
                                                          • Instruction Fuzzy Hash: E30237715083419FC724EF24D881AAFBBE5EF98354F14491DF88A972A1DB30E949CB72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D045F9
                                                          • GetMenuItemCount.USER32(00DC6890), ref: 00D3D7CD
                                                          • GetMenuItemCount.USER32(00DC6890), ref: 00D3D87D
                                                          • GetCursorPos.USER32(?), ref: 00D3D8C1
                                                          • SetForegroundWindow.USER32(00000000), ref: 00D3D8CA
                                                          • TrackPopupMenuEx.USER32(00DC6890,00000000,?,00000000,00000000,00000000), ref: 00D3D8DD
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00D3D8E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                          • String ID:
                                                          • API String ID: 2751501086-0
                                                          • Opcode ID: a148bdeda4c55c0d275e454a4b4aa4650c624400a4cb9486634564c8e035d2d9
                                                          • Instruction ID: 14d7268d079f53ffef1ff8f9d0a549cdc85ca7bac27839317deab76c7eae2605
                                                          • Opcode Fuzzy Hash: a148bdeda4c55c0d275e454a4b4aa4650c624400a4cb9486634564c8e035d2d9
                                                          • Instruction Fuzzy Hash: 2E71E8B0600605BFEB219F54EC85FAABF66FF05364F244216F619A61E1C7B1A810DFB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D80038,?,?), ref: 00D810BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 3964851224-909552448
                                                          • Opcode ID: ea8374b01c539cb30032ae0b2961a46a8248888f02c3ee30a169e4a08ad62c74
                                                          • Instruction ID: e83a7958fb5fe5e96f1227dad45a5f8f59f7fe6ed54095bfeaa85c21b888d556
                                                          • Opcode Fuzzy Hash: ea8374b01c539cb30032ae0b2961a46a8248888f02c3ee30a169e4a08ad62c74
                                                          • Instruction Fuzzy Hash: 5C41677450135ACFCF10FF94E892AEA3B28FF21354F544465EC925B292DB70A91ACBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D07D2C: _memmove.LIBCMT ref: 00D07D66
                                                            • Part of subcall function 00D07A84: _memmove.LIBCMT ref: 00D07B0D
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00D655D2
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00D655E8
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D655F9
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00D6560B
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00D6561C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: SendString$_memmove
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2279737902-1007645807
                                                          • Opcode ID: c871672e706d996c88335cc73b7aeabce97ed1db220cb6e0df4e2605b074a15f
                                                          • Instruction ID: de2cd18a991f3aa9a93066feea691dd788d358c185437852755009f371aa888d
                                                          • Opcode Fuzzy Hash: c871672e706d996c88335cc73b7aeabce97ed1db220cb6e0df4e2605b074a15f
                                                          • Instruction Fuzzy Hash: EA11C830A5015ABDD720F7A9DC4ADFF7BBCEF95B00F440429B406961D5DE601D49C5B1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 208665112-3771769585
                                                          • Opcode ID: 9b881db39d9c3dd1936fc16215c4dd8982b64104ab4db089230d5585e3f598b4
                                                          • Instruction ID: 1bb468b3ee64d1c894c336ad7810e5b37da6e87b5d8808a9f4638ca75b2e7e84
                                                          • Opcode Fuzzy Hash: 9b881db39d9c3dd1936fc16215c4dd8982b64104ab4db089230d5585e3f598b4
                                                          • Instruction Fuzzy Hash: A0110F31904229ABDB20AB24AD4AEEB77BCDF10720F1401BAF448D2191EF709AC18B71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • timeGetTime.WINMM ref: 00D6521C
                                                            • Part of subcall function 00D20719: timeGetTime.WINMM(?,75C0B400,00D10FF9), ref: 00D2071D
                                                          • Sleep.KERNEL32(0000000A), ref: 00D65248
                                                          • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00D6526C
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00D6528E
                                                          • SetActiveWindow.USER32 ref: 00D652AD
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00D652BB
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00D652DA
                                                          • Sleep.KERNEL32(000000FA), ref: 00D652E5
                                                          • IsWindow.USER32 ref: 00D652F1
                                                          • EndDialog.USER32(00000000), ref: 00D65302
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: 1bdb070651367b0085c8caee7d653e01c262b9a74f03001b568c5aa684714f22
                                                          • Instruction ID: 9f44af6c72e5e22be8fa566b7b99a8d75f371d7d7607e3aa729e680be5e36233
                                                          • Opcode Fuzzy Hash: 1bdb070651367b0085c8caee7d653e01c262b9a74f03001b568c5aa684714f22
                                                          • Instruction Fuzzy Hash: 0021CD70224707AFE7005B30FC89F2A7B69EB59786F141528F002C23B5DB619C809B36
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D09997: __itow.LIBCMT ref: 00D099C2
                                                            • Part of subcall function 00D09997: __swprintf.LIBCMT ref: 00D09A0C
                                                          • CoInitialize.OLE32(00000000), ref: 00D6D855
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00D6D8E8
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 00D6D8FC
                                                          • CoCreateInstance.OLE32(00D92D7C,00000000,00000001,00DBA89C,?), ref: 00D6D948
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00D6D9B7
                                                          • CoTaskMemFree.OLE32(?,?), ref: 00D6DA0F
                                                          • _memset.LIBCMT ref: 00D6DA4C
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00D6DA88
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00D6DAAB
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00D6DAB2
                                                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00D6DAE9
                                                          • CoUninitialize.OLE32(00000001,00000000), ref: 00D6DAEB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                          • String ID:
                                                          • API String ID: 1246142700-0
                                                          • Opcode ID: 79bf2f60d3e9666c99bf854847311c0972f3744a12002ad1e165918f94032749
                                                          • Instruction ID: 77932663b750b95eeb9c2406d5ff682250c376eea9c476ab9bf2f5c1b5078931
                                                          • Opcode Fuzzy Hash: 79bf2f60d3e9666c99bf854847311c0972f3744a12002ad1e165918f94032749
                                                          • Instruction Fuzzy Hash: 86B1EE75A00109AFDB04DFA5D898EAEBBF9FF48314B148459F909EB251DB30ED45CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00D605A7
                                                          • SetKeyboardState.USER32(?), ref: 00D60612
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00D60632
                                                          • GetKeyState.USER32(000000A0), ref: 00D60649
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00D60678
                                                          • GetKeyState.USER32(000000A1), ref: 00D60689
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00D606B5
                                                          • GetKeyState.USER32(00000011), ref: 00D606C3
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00D606EC
                                                          • GetKeyState.USER32(00000012), ref: 00D606FA
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00D60723
                                                          • GetKeyState.USER32(0000005B), ref: 00D60731
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 041f184bacf82939a345f77a78bbe734dbb1048d116c161b0311a857e517331b
                                                          • Instruction ID: 14874333a179a357cfdb5f7c7c7cddfaf6203f2d339e0f377b5e8b1ad07f494b
                                                          • Opcode Fuzzy Hash: 041f184bacf82939a345f77a78bbe734dbb1048d116c161b0311a857e517331b
                                                          • Instruction Fuzzy Hash: 3451B674A047882BFB35DBA088557EBBFB4DF11380F0C459AD5C25B5C2DA64AA8CCB71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 00D5C746
                                                          • GetWindowRect.USER32(00000000,?), ref: 00D5C758
                                                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00D5C7B6
                                                          • GetDlgItem.USER32(?,00000002), ref: 00D5C7C1
                                                          • GetWindowRect.USER32(00000000,?), ref: 00D5C7D3
                                                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00D5C827
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00D5C835
                                                          • GetWindowRect.USER32(00000000,?), ref: 00D5C846
                                                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00D5C889
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00D5C897
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00D5C8B4
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00D5C8C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 0909ab6c5228bb651bf8305088346a4feacfd6fc1563693e028369fd68b59dd4
                                                          • Instruction ID: 59906310aaf1a2503748b33da5305e0885d1778bbb667d55d1559849ec1de5bb
                                                          • Opcode Fuzzy Hash: 0909ab6c5228bb651bf8305088346a4feacfd6fc1563693e028369fd68b59dd4
                                                          • Instruction Fuzzy Hash: D9513071B10305AFDF18CF69DD8AAAEBBB6EB88311F14812DF915D7290D7709D448B60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D01B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00D02036,?,00000000,?,?,?,?,00D016CB,00000000,?), ref: 00D01B9A
                                                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00D020D3
                                                          • KillTimer.USER32(-00000001,?,?,?,?,00D016CB,00000000,?,?,00D01AE2,?,?), ref: 00D0216E
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 00D3BEF6
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00D016CB,00000000,?,?,00D01AE2,?,?), ref: 00D3BF27
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00D016CB,00000000,?,?,00D01AE2,?,?), ref: 00D3BF3E
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00D016CB,00000000,?,?,00D01AE2,?,?), ref: 00D3BF5A
                                                          • DeleteObject.GDI32(00000000), ref: 00D3BF6C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: 1f320d9e9eadf241cf227921de4eb75201ecac379cd496c51ab208505bfa25de
                                                          • Instruction ID: 1e6f8176feee4fd39ce9bcd8b608f9cbe265b8c34dce228c74cd9c66dc4e4ea7
                                                          • Opcode Fuzzy Hash: 1f320d9e9eadf241cf227921de4eb75201ecac379cd496c51ab208505bfa25de
                                                          • Instruction Fuzzy Hash: 0D615631101712DFDB259F14CD48B3AB7B1FF40326F188929E68A86AA0C772E881DF71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D025DB: GetWindowLongW.USER32(?,000000EB), ref: 00D025EC
                                                          • GetSysColor.USER32(0000000F), ref: 00D021D3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: 674c29f0db0f56e45abe3404e23571bfab6e041e5395715575d3dfcb33449edc
                                                          • Instruction ID: cb32bec01b5cfae70237aba2797227df5c628e43efcd6fe33c56ba8b3a327f8b
                                                          • Opcode Fuzzy Hash: 674c29f0db0f56e45abe3404e23571bfab6e041e5395715575d3dfcb33449edc
                                                          • Instruction Fuzzy Hash: EF41A031001240ABDB255F78DC8CBB93B65EB46331F584265FD69CA2E6C7318C82DB35
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,00D8F910), ref: 00D6AB76
                                                          • GetDriveTypeW.KERNEL32(00000061,00DBA620,00000061), ref: 00D6AC40
                                                          • _wcscpy.LIBCMT ref: 00D6AC6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: BuffCharDriveLowerType_wcscpy
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2820617543-1000479233
                                                          • Opcode ID: da71e763f2e0b35a8edd5a4bd8415a3f6f0af855bf97b08b5939471b5c19b8a3
                                                          • Instruction ID: b21837cb5db1d2be35b3f8bcbea04827c8df0e4e30640174078ba8c9d05a99a6
                                                          • Opcode Fuzzy Hash: da71e763f2e0b35a8edd5a4bd8415a3f6f0af855bf97b08b5939471b5c19b8a3
                                                          • Instruction Fuzzy Hash: D85159306183019FC714EF18D891AAEB7A5EF95304F544829F4DAA72A2DB31E949CA73
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __i64tow__itow__swprintf
                                                          • String ID: %.15g$0x%p$False$True
                                                          • API String ID: 421087845-2263619337
                                                          • Opcode ID: b1b55ecf7a8bfafb6eb8f796e073bdccba745fc6b3009452a526f0eebb1d3f95
                                                          • Instruction ID: 3b7be00cce431fae5c17c4fcef95279574c0e74acf6e143603af35f46395e4c7
                                                          • Opcode Fuzzy Hash: b1b55ecf7a8bfafb6eb8f796e073bdccba745fc6b3009452a526f0eebb1d3f95
                                                          • Instruction Fuzzy Hash: 1D41A271A04219AEDB249B38E842F7AB7E8EF44314F24446EE58DD72D2EA71D9418F31
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D873D9
                                                          • CreateMenu.USER32 ref: 00D873F4
                                                          • SetMenu.USER32(?,00000000), ref: 00D87403
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D87490
                                                          • IsMenu.USER32(?), ref: 00D874A6
                                                          • CreatePopupMenu.USER32 ref: 00D874B0
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00D874DD
                                                          • DrawMenuBar.USER32 ref: 00D874E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                          • String ID: 0$F
                                                          • API String ID: 176399719-3044882817
                                                          • Opcode ID: a7cb2577a7525822664e72a8613137c91862a19de5bad7fab46c294f43c09ed8
                                                          • Instruction ID: 275ac772f5dc9d230b05fc11b6663f9273670f33d1e1b5ebfd605f8e293f5a59
                                                          • Opcode Fuzzy Hash: a7cb2577a7525822664e72a8613137c91862a19de5bad7fab46c294f43c09ed8
                                                          • Instruction Fuzzy Hash: CA41F775A05305EFDB10EF68D888E9ABBB9FF49310F284469E955A7360D731E910CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00D877CD
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00D877D4
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00D877E7
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00D877EF
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00D877FA
                                                          • DeleteDC.GDI32(00000000), ref: 00D87803
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00D8780D
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00D87821
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00D8782D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: b61b0494058b50b7223da88ff3e46df97aab6e5f769de7363e19770b34c35668
                                                          • Instruction ID: 6584b8305c3bb19873a16717522cc23a6e66ecf3d2ff3986903fcac7bb9c5e6c
                                                          • Opcode Fuzzy Hash: b61b0494058b50b7223da88ff3e46df97aab6e5f769de7363e19770b34c35668
                                                          • Instruction Fuzzy Hash: F7318932114215AFDF12AFA4DC09FEA3B69FF09720F240225FA15E62A0D731D821DBB4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D2707B
                                                            • Part of subcall function 00D28D68: __getptd_noexit.LIBCMT ref: 00D28D68
                                                          • __gmtime64_s.LIBCMT ref: 00D27114
                                                          • __gmtime64_s.LIBCMT ref: 00D2714A
                                                          • __gmtime64_s.LIBCMT ref: 00D27167
                                                          • __allrem.LIBCMT ref: 00D271BD
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D271D9
                                                          • __allrem.LIBCMT ref: 00D271F0
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D2720E
                                                          • __allrem.LIBCMT ref: 00D27225
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D27243
                                                          • __invoke_watson.LIBCMT ref: 00D272B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                          • String ID:
                                                          • API String ID: 384356119-0
                                                          • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                                          • Instruction ID: 1e2e6b453be25e5977f77f2c9d636415aeb640da635ecc7ad24ea700477494a6
                                                          • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                                          • Instruction Fuzzy Hash: 3171F971A04726EBD7249E79DD42B5AB3B8FF20328F14422AF514E7281E770E9448BF4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D62A31
                                                          • GetMenuItemInfoW.USER32(00DC6890,000000FF,00000000,00000030), ref: 00D62A92
                                                          • SetMenuItemInfoW.USER32(00DC6890,00000004,00000000,00000030), ref: 00D62AC8
                                                          • Sleep.KERNEL32(000001F4), ref: 00D62ADA
                                                          • GetMenuItemCount.USER32(?), ref: 00D62B1E
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00D62B3A
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 00D62B64
                                                          • GetMenuItemID.USER32(?,?), ref: 00D62BA9
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00D62BEF
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D62C03
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D62C24
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                          • String ID:
                                                          • API String ID: 4176008265-0
                                                          • Opcode ID: 48a86c62d7d1174900416c76cd0e52419fe7631c73bae932ccee2855199ed072
                                                          • Instruction ID: e58bd7aa19b1fcac9135a75abee97d20b78bdeb98639c9148d5c6d06cd632938
                                                          • Opcode Fuzzy Hash: 48a86c62d7d1174900416c76cd0e52419fe7631c73bae932ccee2855199ed072
                                                          • Instruction Fuzzy Hash: 1861B1B090074AAFDB21CFA8DC88EBEBBB8EB45304F180569E881D7255D771AD05DB31
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00D87214
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00D87217
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D8723B
                                                          • _memset.LIBCMT ref: 00D8724C
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D8725E
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00D872D6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow_memset
                                                          • String ID:
                                                          • API String ID: 830647256-0
                                                          • Opcode ID: b31515d84662db7dcb7ba2571795bf2007cfecc48ed109d54af38d580d63cd83
                                                          • Instruction ID: 14c4578507e41693c842ec9cb1f07977a598294609629f5589d184e7714af807
                                                          • Opcode Fuzzy Hash: b31515d84662db7dcb7ba2571795bf2007cfecc48ed109d54af38d580d63cd83
                                                          • Instruction Fuzzy Hash: D96149B5A00209AFDB11EFA4CC85EEE77B8EF09714F240169FA14E72A1D770E945DB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00D57135
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00D5718E
                                                          • VariantInit.OLEAUT32(?), ref: 00D571A0
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00D571C0
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00D57213
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00D57227
                                                          • VariantClear.OLEAUT32(?), ref: 00D5723C
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00D57249
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00D57252
                                                          • VariantClear.OLEAUT32(?), ref: 00D57264
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00D5726F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: 10fa73b720a718040e96d36c84c542becf9cb8e9d4db4e5ab41ea94eb577813c
                                                          • Instruction ID: ccb96df86685fc184501197f59c0729e3cce253c917edc4d23535e790f9e41fa
                                                          • Opcode Fuzzy Hash: 10fa73b720a718040e96d36c84c542becf9cb8e9d4db4e5ab41ea94eb577813c
                                                          • Instruction Fuzzy Hash: 7D412C35A04219AFCF00DFA8D8449AEBBB9EF48355F108069FD55E7361CB30A949CBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 00D75AA6
                                                          • inet_addr.WSOCK32(?), ref: 00D75AEB
                                                          • gethostbyname.WSOCK32(?), ref: 00D75AF7
                                                          • IcmpCreateFile.IPHLPAPI ref: 00D75B05
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00D75B75
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00D75B8B
                                                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00D75C00
                                                          • WSACleanup.WSOCK32 ref: 00D75C06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: 1e107626389b4bf72f8c4839eee6545495b6307bc73817508e6f181654d0fb3b
                                                          • Instruction ID: 64a9834ff8c857bdb54fcc498bc9c55f0a0923cd64840fc54ba03d6b0ec26d93
                                                          • Opcode Fuzzy Hash: 1e107626389b4bf72f8c4839eee6545495b6307bc73817508e6f181654d0fb3b
                                                          • Instruction Fuzzy Hash: 8E5172316047019FDB119F24DC49B2AB7E4EF48710F14892AF999DB2E5EBB0E840DB76
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00D6B73B
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00D6B7B1
                                                          • GetLastError.KERNEL32 ref: 00D6B7BB
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 00D6B828
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: 11a982db4026ce8b2de85ba2378d1fd67f6b3cc56c3c909f6174932fb97dec5c
                                                          • Instruction ID: 77d70cecb74a82dcb75b59ebfb1c36b61d08f4965310a156f8aa93967f8c0199
                                                          • Opcode Fuzzy Hash: 11a982db4026ce8b2de85ba2378d1fd67f6b3cc56c3c909f6174932fb97dec5c
                                                          • Instruction Fuzzy Hash: 9E314135A00305AFDB10EF68D885ABEBBB8EF55720F14402AE506D7291DB719986CB71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                            • Part of subcall function 00D5B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00D5B0E7
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00D594F6
                                                          • GetDlgCtrlID.USER32 ref: 00D59501
                                                          • GetParent.USER32 ref: 00D5951D
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00D59520
                                                          • GetDlgCtrlID.USER32(?), ref: 00D59529
                                                          • GetParent.USER32(?), ref: 00D59545
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00D59548
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: a27f98d72a7bd44bf69d5d08150ab43bbb1465195797be9a49f9101146ac35cf
                                                          • Instruction ID: 5930d25f7a9e9ea229e5cab148f3292ecf33e3f1a5fc925b3ce0ed93bc9e7d42
                                                          • Opcode Fuzzy Hash: a27f98d72a7bd44bf69d5d08150ab43bbb1465195797be9a49f9101146ac35cf
                                                          • Instruction Fuzzy Hash: 0621B270A00204ABCF05AB65CC95EFEBB64EF49310F100219BD62972E1EB7599199B30
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                            • Part of subcall function 00D5B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00D5B0E7
                                                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00D595DF
                                                          • GetDlgCtrlID.USER32 ref: 00D595EA
                                                          • GetParent.USER32 ref: 00D59606
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00D59609
                                                          • GetDlgCtrlID.USER32(?), ref: 00D59612
                                                          • GetParent.USER32(?), ref: 00D5962E
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00D59631
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: 16cd23462d6f4ee28b73bb2feef0babf42e31c8966b102dead7b85d20f4ff640
                                                          • Instruction ID: 71c3439dcf91f74b3c703b0f06d79ebc176fe4d199c41bb353e07eeb5dc8e2bb
                                                          • Opcode Fuzzy Hash: 16cd23462d6f4ee28b73bb2feef0babf42e31c8966b102dead7b85d20f4ff640
                                                          • Instruction Fuzzy Hash: 8821A174A00208BBDF01AB65CC95EFEBBB8EF49300F100115BD51972E1EB75991D9B30
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetParent.USER32 ref: 00D59651
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00D59666
                                                          • _wcscmp.LIBCMT ref: 00D59678
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00D596F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend_wcscmp
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1704125052-3381328864
                                                          • Opcode ID: ae2aab825f49570a6839674dbdc59ff6c5bdc60db2cb3708705e5ba4bf016543
                                                          • Instruction ID: 4997202065b5ec9fc75cf08bdd523ad9515148339c41c8d5004fb42c0ce0f85b
                                                          • Opcode Fuzzy Hash: ae2aab825f49570a6839674dbdc59ff6c5bdc60db2cb3708705e5ba4bf016543
                                                          • Instruction Fuzzy Hash: 54112776288353FAFE152620EC27DE6F79CCB15325B200026FE00A10D1FE71991C4A78
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00D78BEC
                                                          • CoInitialize.OLE32(00000000), ref: 00D78C19
                                                          • CoUninitialize.OLE32 ref: 00D78C23
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00D78D23
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00D78E50
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00D92C0C), ref: 00D78E84
                                                          • CoGetObject.OLE32(?,00000000,00D92C0C,?), ref: 00D78EA7
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00D78EBA
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00D78F3A
                                                          • VariantClear.OLEAUT32(?), ref: 00D78F4A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                          • String ID:
                                                          • API String ID: 2395222682-0
                                                          • Opcode ID: c4e07ef2b3874ced95e71e7ccf9d400da0249739c10704871a80b96674ad59c9
                                                          • Instruction ID: b323f8fa3e36204f8e4bbce9d7461f2431b8ff7fad0939cd03285d77fbd63b91
                                                          • Opcode Fuzzy Hash: c4e07ef2b3874ced95e71e7ccf9d400da0249739c10704871a80b96674ad59c9
                                                          • Instruction Fuzzy Hash: BDC115B1604305AFD700DF64C88892AB7E9FF88748F14895DF989DB251EB71ED05CB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __swprintf.LIBCMT ref: 00D6419D
                                                          • __swprintf.LIBCMT ref: 00D641AA
                                                            • Part of subcall function 00D238D8: __woutput_l.LIBCMT ref: 00D23931
                                                          • FindResourceW.KERNEL32(?,?,0000000E), ref: 00D641D4
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00D641E0
                                                          • LockResource.KERNEL32(00000000), ref: 00D641ED
                                                          • FindResourceW.KERNEL32(?,?,00000003), ref: 00D6420D
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00D6421F
                                                          • SizeofResource.KERNEL32(?,00000000), ref: 00D6422E
                                                          • LockResource.KERNEL32(?), ref: 00D6423A
                                                          • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00D6429B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                          • String ID:
                                                          • API String ID: 1433390588-0
                                                          • Opcode ID: dfb82b91818d429a65025c151d1943c5a78a4160c7faf216370427a47a28e4e2
                                                          • Instruction ID: 8db4a90e0d00fa2ef7d9c6b95e34cfb94ecf1fc83f35c20d18f4135c139908ec
                                                          • Opcode Fuzzy Hash: dfb82b91818d429a65025c151d1943c5a78a4160c7faf216370427a47a28e4e2
                                                          • Instruction Fuzzy Hash: 4831BCB1A0131AAFCB019FA0EC58EBF7BACEF08701F144525F801D6250E734DA618BB8
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00D61700
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00D60778,?,00000001), ref: 00D61714
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 00D6171B
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00D60778,?,00000001), ref: 00D6172A
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00D6173C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00D60778,?,00000001), ref: 00D61755
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00D60778,?,00000001), ref: 00D61767
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00D60778,?,00000001), ref: 00D617AC
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00D60778,?,00000001), ref: 00D617C1
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00D60778,?,00000001), ref: 00D617CC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: fb422686cb22cbbc1918a79ce99dc8abcc776853393a5c0ef854ece1db0ec3e9
                                                          • Instruction ID: 2bf17a86a285171da66e78cd64bb299287af04c39393c8d587f4ade4a386c7b9
                                                          • Opcode Fuzzy Hash: fb422686cb22cbbc1918a79ce99dc8abcc776853393a5c0ef854ece1db0ec3e9
                                                          • Instruction Fuzzy Hash: 2B31897961430AFFEB219F25EC89F697BA9AF55711F184029F804C63A0EBB49D408F70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00D0FC06
                                                          • OleUninitialize.OLE32(?,00000000), ref: 00D0FCA5
                                                          • UnregisterHotKey.USER32(?), ref: 00D0FDFC
                                                          • DestroyWindow.USER32(?), ref: 00D44A00
                                                          • FreeLibrary.KERNEL32(?), ref: 00D44A65
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00D44A92
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: 05321b3f5b374e22eb977ce7a4835167f18570196dec4501a92ce9c618e27bc4
                                                          • Instruction ID: 73d115aad9ae72f12dd86fdbb0de4049089686e605c7577eb6ab3c9ed6d30b0f
                                                          • Opcode Fuzzy Hash: 05321b3f5b374e22eb977ce7a4835167f18570196dec4501a92ce9c618e27bc4
                                                          • Instruction Fuzzy Hash: 62A16C307012129FDB29EF14D495B69F764EF04704F2842ADE80AAB2A2DB30ED56CF74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnumChildWindows.USER32(?,00D5AA64), ref: 00D5A9A2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ChildEnumWindows
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 3555792229-1603158881
                                                          • Opcode ID: aa36adabf8b098e66ce2d9cd0529100469bdb2956b2e330d947d6a4ad4913c2f
                                                          • Instruction ID: 63155113e197c32af33eaa8ae4c1a9c06f3bd9f4be799fceffe70ba7129da996
                                                          • Opcode Fuzzy Hash: aa36adabf8b098e66ce2d9cd0529100469bdb2956b2e330d947d6a4ad4913c2f
                                                          • Instruction Fuzzy Hash: E8917230A00666EADF08DF64C481BE9FB64FF14305F548219DD9AA7291DB30AA5DCFB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00D02EAE
                                                            • Part of subcall function 00D01DB3: GetClientRect.USER32(?,?), ref: 00D01DDC
                                                            • Part of subcall function 00D01DB3: GetWindowRect.USER32(?,?), ref: 00D01E1D
                                                            • Part of subcall function 00D01DB3: ScreenToClient.USER32(?,?), ref: 00D01E45
                                                          • GetDC.USER32 ref: 00D3CF82
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00D3CF95
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00D3CFA3
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00D3CFB8
                                                          • ReleaseDC.USER32(?,00000000), ref: 00D3CFC0
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00D3D04B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: 23de051980f2724d56dc978b5278c19576209802003e1c47adfb154261fa7aea
                                                          • Instruction ID: 1a49f138a69a25a394ea74f9b735e9ed798f3c7f3b0769057053a24cadf4c743
                                                          • Opcode Fuzzy Hash: 23de051980f2724d56dc978b5278c19576209802003e1c47adfb154261fa7aea
                                                          • Instruction Fuzzy Hash: 7471BE31501205DFCF258F64C885ABA7BB6FF49360F18426AFD95AA2A6C731C841DF70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D02612: GetWindowLongW.USER32(?,000000EB), ref: 00D02623
                                                            • Part of subcall function 00D02344: GetCursorPos.USER32(?), ref: 00D02357
                                                            • Part of subcall function 00D02344: ScreenToClient.USER32(00DC67B0,?), ref: 00D02374
                                                            • Part of subcall function 00D02344: GetAsyncKeyState.USER32(00000001), ref: 00D02399
                                                            • Part of subcall function 00D02344: GetAsyncKeyState.USER32(00000002), ref: 00D023A7
                                                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00D8C2E4
                                                          • ImageList_EndDrag.COMCTL32 ref: 00D8C2EA
                                                          • ReleaseCapture.USER32 ref: 00D8C2F0
                                                          • SetWindowTextW.USER32(?,00000000), ref: 00D8C39A
                                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00D8C3AD
                                                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00D8C48F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                          • API String ID: 1924731296-2107944366
                                                          • Opcode ID: 4a0d51c899f35be10669e07507de824d4aeaf73facfad701730678b173410eea
                                                          • Instruction ID: cb312cb2a5af00d6b94428ce7c19465da71bdcdb96ddeadcc18a9673ecd735cd
                                                          • Opcode Fuzzy Hash: 4a0d51c899f35be10669e07507de824d4aeaf73facfad701730678b173410eea
                                                          • Instruction Fuzzy Hash: 79515970204306AFDB00EF24C856F6A7BE5EF88314F04492DF5958B2E1DB71A958DB72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00D8F910), ref: 00D7903D
                                                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00D8F910), ref: 00D79071
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00D791EB
                                                          • SysFreeString.OLEAUT32(?), ref: 00D79215
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                          • String ID:
                                                          • API String ID: 560350794-0
                                                          • Opcode ID: 265e4aeb1c05b6241d6352504a01a735ac965b5d92dbef561be36d28ac480194
                                                          • Instruction ID: 1bed72b44f2cfa5264ba993374de172635b5cd667a9202f394e96ba751484712
                                                          • Opcode Fuzzy Hash: 265e4aeb1c05b6241d6352504a01a735ac965b5d92dbef561be36d28ac480194
                                                          • Instruction Fuzzy Hash: BAF12E72A00209EFDF04DF94C898EAEB7B9FF49315F148059F919AB291DB31AD45CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D7F9C9
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00D7FB5C
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00D7FB80
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00D7FBC0
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00D7FBE2
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00D7FD5E
                                                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00D7FD90
                                                          • CloseHandle.KERNEL32(?), ref: 00D7FDBF
                                                          • CloseHandle.KERNEL32(?), ref: 00D7FE36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                          • String ID:
                                                          • API String ID: 4090791747-0
                                                          • Opcode ID: 6e70893a01f604539e573b7256051b7a125464efa1ba99cb6fb478675fd83569
                                                          • Instruction ID: 04094a9116547e5ea1f4f6906196e15c2c0d6277aadb7592da616981189e5282
                                                          • Opcode Fuzzy Hash: 6e70893a01f604539e573b7256051b7a125464efa1ba99cb6fb478675fd83569
                                                          • Instruction Fuzzy Hash: 78E180312043419FCB25EF24D491B6ABBE1EF84354F18896DF8999B2A2DB71DC44CB72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D648AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00D638D3,?), ref: 00D648C7
                                                            • Part of subcall function 00D648AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00D638D3,?), ref: 00D648E0
                                                            • Part of subcall function 00D64CD3: GetFileAttributesW.KERNEL32(?,00D63947), ref: 00D64CD4
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00D64FE2
                                                          • _wcscmp.LIBCMT ref: 00D64FFC
                                                          • MoveFileW.KERNEL32(?,?), ref: 00D65017
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                          • String ID:
                                                          • API String ID: 793581249-0
                                                          • Opcode ID: 8b242d4985be0a754d072e42413596f9ac383624e43e63001f8c2ec7a84de1f3
                                                          • Instruction ID: e1971bf804a2ea8a743b1dbb28a7c25074444c40aa2e94a7702a580f96d17d1b
                                                          • Opcode Fuzzy Hash: 8b242d4985be0a754d072e42413596f9ac383624e43e63001f8c2ec7a84de1f3
                                                          • Instruction Fuzzy Hash: 595162B24087859BC724DB60D8819DFB3ECEF95301F04092EB589D7191EF74E6888776
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00D8896E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 8d095df3110bb7afd8f2bea8a6b3605650ea198fa15dc8de61ebf147dc4d7c41
                                                          • Instruction ID: c5693bad0f6bb1b161676e3ded876b2df1432c20525872c3f57c258822569040
                                                          • Opcode Fuzzy Hash: 8d095df3110bb7afd8f2bea8a6b3605650ea198fa15dc8de61ebf147dc4d7c41
                                                          • Instruction Fuzzy Hash: 91517130600209BBEB24BF28DC89BA97B65FB05310FA44216F555E76E1DF71E980AB71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00D3C547
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00D3C569
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00D3C581
                                                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00D3C59F
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00D3C5C0
                                                          • DestroyIcon.USER32(00000000), ref: 00D3C5CF
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00D3C5EC
                                                          • DestroyIcon.USER32(?), ref: 00D3C5FB
                                                            • Part of subcall function 00D8A71E: DeleteObject.GDI32(00000000), ref: 00D8A757
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                          • String ID:
                                                          • API String ID: 2819616528-0
                                                          • Opcode ID: f2fc405aa8c686aef6fd2642ed74731ee951314711126f346750d3f44f65c3bd
                                                          • Instruction ID: 4491b0a2c6ec98d82409cba5b98c3d6956a865938a12748e8d5b268405cb3a1d
                                                          • Opcode Fuzzy Hash: f2fc405aa8c686aef6fd2642ed74731ee951314711126f346750d3f44f65c3bd
                                                          • Instruction Fuzzy Hash: 62513570A11209AFDB24DF24CC49FAA7BB5EB58350F144529F946E72E0DB70E990DB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D5AE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D5AE77
                                                            • Part of subcall function 00D5AE57: GetCurrentThreadId.KERNEL32 ref: 00D5AE7E
                                                            • Part of subcall function 00D5AE57: AttachThreadInput.USER32(00000000,?,00D59B65,?,00000001), ref: 00D5AE85
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D59B70
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00D59B8D
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00D59B90
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D59B99
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00D59BB7
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00D59BBA
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D59BC3
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00D59BDA
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00D59BDD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: 4b996292b61e413cf78af8acca3888935dea600ff4c6aa9a8bfa1f2027b05fe7
                                                          • Instruction ID: f6c705b8195982e38a5988656d288db4c0e24ce29599701357f26b12dcdb4595
                                                          • Opcode Fuzzy Hash: 4b996292b61e413cf78af8acca3888935dea600ff4c6aa9a8bfa1f2027b05fe7
                                                          • Instruction Fuzzy Hash: 3011C2B1660318BEFA106B64DC8AF6A7A1DDB4C751F100525FA44EB1A0C9F25C10DBB4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00D58A84,00000B00,?,?), ref: 00D58E0C
                                                          • HeapAlloc.KERNEL32(00000000,?,00D58A84,00000B00,?,?), ref: 00D58E13
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00D58A84,00000B00,?,?), ref: 00D58E28
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00D58A84,00000B00,?,?), ref: 00D58E30
                                                          • DuplicateHandle.KERNEL32(00000000,?,00D58A84,00000B00,?,?), ref: 00D58E33
                                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00D58A84,00000B00,?,?), ref: 00D58E43
                                                          • GetCurrentProcess.KERNEL32(00D58A84,00000000,?,00D58A84,00000B00,?,?), ref: 00D58E4B
                                                          • DuplicateHandle.KERNEL32(00000000,?,00D58A84,00000B00,?,?), ref: 00D58E4E
                                                          • CreateThread.KERNEL32(00000000,00000000,00D58E74,00000000,00000000,00000000), ref: 00D58E68
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: 694b547f5db2f47bd4f091a1fd0abb6b3a163aec5da2e09ff326ebef53e6837d
                                                          • Instruction ID: 29e0e8850066bbc1dfded225ea24a290d03467fe54aaa02123219fdaf192800b
                                                          • Opcode Fuzzy Hash: 694b547f5db2f47bd4f091a1fd0abb6b3a163aec5da2e09ff326ebef53e6837d
                                                          • Instruction Fuzzy Hash: AA01BBB5650348FFEB10ABA5DC8DF6B3BACEB89711F004421FA05DB2A1CA759814CB30
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$_memset
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2862541840-625585964
                                                          • Opcode ID: ca939c373a71af0f048f48c39a6d37d68f281f76ef125653d051254c38e91427
                                                          • Instruction ID: b43cd96683b62138c1a2e0f01b22b34b4b97c018f06831ced206b39e304059b2
                                                          • Opcode Fuzzy Hash: ca939c373a71af0f048f48c39a6d37d68f281f76ef125653d051254c38e91427
                                                          • Instruction Fuzzy Hash: 9E91AD72A00219AFDF20DFA5C854FAEBBB8EF45714F14815AF519AB280E7709905CFB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D57652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D5758C,80070057,?,?,?,00D5799D), ref: 00D5766F
                                                            • Part of subcall function 00D57652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D5758C,80070057,?,?), ref: 00D5768A
                                                            • Part of subcall function 00D57652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D5758C,80070057,?,?), ref: 00D57698
                                                            • Part of subcall function 00D57652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D5758C,80070057,?), ref: 00D576A8
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00D79B1B
                                                          • _memset.LIBCMT ref: 00D79B28
                                                          • _memset.LIBCMT ref: 00D79C6B
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00D79C97
                                                          • CoTaskMemFree.OLE32(?), ref: 00D79CA2
                                                          Strings
                                                          • NULL Pointer assignment, xrefs: 00D79CF0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 1300414916-2785691316
                                                          • Opcode ID: 401223ad152c496bcc06224c460f921a87544ce7a2c5f6d488327d864ac3105c
                                                          • Instruction ID: 50ae78fd6346dd87c2b29b5ea244706c7128528ae0ef34831355996165f94961
                                                          • Opcode Fuzzy Hash: 401223ad152c496bcc06224c460f921a87544ce7a2c5f6d488327d864ac3105c
                                                          • Instruction Fuzzy Hash: 50910D72D00219ABDF10DF95DC95ADEBBB9EF08710F108159F519A7281EB715A44CFB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00D87093
                                                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 00D870A7
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00D870C1
                                                          • _wcscat.LIBCMT ref: 00D8711C
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00D87133
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00D87161
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcscat
                                                          • String ID: SysListView32
                                                          • API String ID: 307300125-78025650
                                                          • Opcode ID: 80706f8ef10880f78865bbf25bdba69a4b34bee5043c926b144e9f085e8f9189
                                                          • Instruction ID: 363b805f63e7fcb84566e698080b66c6a678f765d69959e7e5829204cbd3cfc5
                                                          • Opcode Fuzzy Hash: 80706f8ef10880f78865bbf25bdba69a4b34bee5043c926b144e9f085e8f9189
                                                          • Instruction Fuzzy Hash: 60417071A04309AFDB21AF64CC85BEE77B8EF08354F24096AF585E7291D671DD848B70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D63E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00D63EB6
                                                            • Part of subcall function 00D63E91: Process32FirstW.KERNEL32(00000000,?), ref: 00D63EC4
                                                            • Part of subcall function 00D63E91: CloseHandle.KERNEL32(00000000), ref: 00D63F8E
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00D7ECB8
                                                          • GetLastError.KERNEL32 ref: 00D7ECCB
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00D7ECFA
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00D7ED77
                                                          • GetLastError.KERNEL32(00000000), ref: 00D7ED82
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D7EDB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: 13c2e5c09a419c414550fc545e1e2223426001c3b90468707132a8f4fb9f2df7
                                                          • Instruction ID: df36cf6613668479d0792c9bfa732b8c9b209001cdff3125ce7234dfb25e0dd6
                                                          • Opcode Fuzzy Hash: 13c2e5c09a419c414550fc545e1e2223426001c3b90468707132a8f4fb9f2df7
                                                          • Instruction Fuzzy Hash: 06418C712002019FDB24EF24CC95F6DB7A5EF44714F088459F84A9B2D2EBB5E808CBB5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 00D632C5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: 4b5b6f612455d666111b33e5dccc0c74874f7496a73b887c6647f00ff76fef26
                                                          • Instruction ID: 4da90156c887e333a0b1a547ceaf150faca69cf4862871af12755ad0a2167218
                                                          • Opcode Fuzzy Hash: 4b5b6f612455d666111b33e5dccc0c74874f7496a73b887c6647f00ff76fef26
                                                          • Instruction Fuzzy Hash: 6311E731648756BFA7055B58ECA2DAAB3ACDF1D374F20002AF501A6281E7759B4046BD
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00D6454E
                                                          • LoadStringW.USER32(00000000), ref: 00D64555
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00D6456B
                                                          • LoadStringW.USER32(00000000), ref: 00D64572
                                                          • _wprintf.LIBCMT ref: 00D64598
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00D645B6
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 00D64593
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wprintf
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 3648134473-3128320259
                                                          • Opcode ID: c81fb61e94ab82aa07d2fc87e2eae46831bc736ad136bd35bf012075965c57f1
                                                          • Instruction ID: fc4ba75032f1ea28e033c52ccbf722f0030d8864cf26ed2b94ecd5e32fff4b89
                                                          • Opcode Fuzzy Hash: c81fb61e94ab82aa07d2fc87e2eae46831bc736ad136bd35bf012075965c57f1
                                                          • Instruction Fuzzy Hash: 560162F2900308BFE750A7A4DD89EEB776CEB08301F4005A5BB46E2151EA749E858B70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D02612: GetWindowLongW.USER32(?,000000EB), ref: 00D02623
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00D8D78A
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00D8D7AA
                                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00D8D9E5
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00D8DA03
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00D8DA24
                                                          • ShowWindow.USER32(00000003,00000000), ref: 00D8DA43
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00D8DA68
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00D8DA8B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                          • String ID:
                                                          • API String ID: 1211466189-0
                                                          • Opcode ID: f6c38b844c7a737a15fccb234eddc0feb7241c406a7b98aa47b2887078b27832
                                                          • Instruction ID: 5c0c72cb503587afb6d5a3ec86f1c3bddc3a7636f463c36d2d976a20cda60287
                                                          • Opcode Fuzzy Hash: f6c38b844c7a737a15fccb234eddc0feb7241c406a7b98aa47b2887078b27832
                                                          • Instruction Fuzzy Hash: 36B17A71600215EBDF18EF69C985BBD7BB2FF48701F188169EC88AB2D5D734A950CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00D3C417,00000004,00000000,00000000,00000000), ref: 00D02ACF
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00D3C417,00000004,00000000,00000000,00000000,000000FF), ref: 00D02B17
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00D3C417,00000004,00000000,00000000,00000000), ref: 00D3C46A
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00D3C417,00000004,00000000,00000000,00000000), ref: 00D3C4D6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: d06afa7f2b42ec0d40846afd5c09f0ace81a35d7aa22eef1a287199dd8a883d6
                                                          • Instruction ID: fe2b594d509268950d3ee43ef115835628777e3d17673b4c74a8996b5e91ff2c
                                                          • Opcode Fuzzy Hash: d06afa7f2b42ec0d40846afd5c09f0ace81a35d7aa22eef1a287199dd8a883d6
                                                          • Instruction Fuzzy Hash: 03410B30315780AADB358B288C9CB7A7B92AF45314F5C881DE09FD66E0CA75E841D730
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00D6737F
                                                            • Part of subcall function 00D20FF6: std::exception::exception.LIBCMT ref: 00D2102C
                                                            • Part of subcall function 00D20FF6: __CxxThrowException@8.LIBCMT ref: 00D21041
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00D673B6
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00D673D2
                                                          • _memmove.LIBCMT ref: 00D67420
                                                          • _memmove.LIBCMT ref: 00D6743D
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00D6744C
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00D67461
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00D67480
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 256516436-0
                                                          • Opcode ID: e3b16d90fb6b86fd45985f4d0353ecaa1d6161b8ab879ea530d65085152f2a34
                                                          • Instruction ID: a7b2767e2b52cfd604e9b17f513755a81fe19fda3d4f34ec9307d6e27bc8ce24
                                                          • Opcode Fuzzy Hash: e3b16d90fb6b86fd45985f4d0353ecaa1d6161b8ab879ea530d65085152f2a34
                                                          • Instruction Fuzzy Hash: 03318D75904219EBCF10DFA4DD89AAEBBB8EF44714F1481A5F904EB246DB309A10CBB4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00D8645A
                                                          • GetDC.USER32(00000000), ref: 00D86462
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D8646D
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00D86479
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00D864B5
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00D864C6
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00D89299,?,?,000000FF,00000000,?,000000FF,?), ref: 00D86500
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00D86520
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: f1ccabf322baca194605966d1f31d1da617dd465ee40b1de2a4c070440c532f5
                                                          • Instruction ID: 1c43575efa97618e83feb3a5a3757dec2b7c55439f401842064b9f208870ab00
                                                          • Opcode Fuzzy Hash: f1ccabf322baca194605966d1f31d1da617dd465ee40b1de2a4c070440c532f5
                                                          • Instruction Fuzzy Hash: D3316972211214BFEB119F50CC8AFEA3FADEF09761F0841A5FE08DA2A5D6759841CB74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: c37d37041961d60a93aea1b9b16cc2542c1e1a445c41174ba3412a242c06b19d
                                                          • Instruction ID: a443e5c9d3255c04800612525f1c516bb35752b2f6ed5447209b4d1b6f11f3b0
                                                          • Opcode Fuzzy Hash: c37d37041961d60a93aea1b9b16cc2542c1e1a445c41174ba3412a242c06b19d
                                                          • Instruction Fuzzy Hash: 3A21BE65610715BF9E10B5259C46FBF239CEE303AAB089020FD09966C2E751DE1986B5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D09997: __itow.LIBCMT ref: 00D099C2
                                                            • Part of subcall function 00D09997: __swprintf.LIBCMT ref: 00D09A0C
                                                            • Part of subcall function 00D1FEC6: _wcscpy.LIBCMT ref: 00D1FEE9
                                                          • _wcstok.LIBCMT ref: 00D6EEFF
                                                          • _wcscpy.LIBCMT ref: 00D6EF8E
                                                          • _memset.LIBCMT ref: 00D6EFC1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                          • String ID: X
                                                          • API String ID: 774024439-3081909835
                                                          • Opcode ID: d530e6ddc89922cbe3248c72f924c5f1633c78636d0be61101af85d015d1e998
                                                          • Instruction ID: 761258a2140f5127a396744ad98d0942a11544d4bb1513d5e2128eb0101b4d90
                                                          • Opcode Fuzzy Hash: d530e6ddc89922cbe3248c72f924c5f1633c78636d0be61101af85d015d1e998
                                                          • Instruction Fuzzy Hash: A3C18D755087409FC724EF24D891B9AB7E0EF95310F04492DF89A8B2A2DB70ED45CBB2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3b50b7d9313b8e63200368ec233b03438a5ccbdd2cf97a425b5a2e08514421c3
                                                          • Instruction ID: d65ff93394614df6857cf0cf90527a0b30359af0c08b38258b741eca535b348c
                                                          • Opcode Fuzzy Hash: 3b50b7d9313b8e63200368ec233b03438a5ccbdd2cf97a425b5a2e08514421c3
                                                          • Instruction Fuzzy Hash: 94713A34900109EFCB15DF98CC89BAEBB79FF85324F148159F919AA291C734AA51CBB4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 140b8441f869575abdd810aabcb60a08a6cb0f8e36d9e28d6f27217e61c54e00
                                                          • Instruction ID: 1d23500e03fe87b07802ba9888368854c0fc08662e742f5a48624f8cb4e09570
                                                          • Opcode Fuzzy Hash: 140b8441f869575abdd810aabcb60a08a6cb0f8e36d9e28d6f27217e61c54e00
                                                          • Instruction Fuzzy Hash: 1461AF71508300ABD710EB24DC96F6BB7A9EF84714F54891DF989972E2EA70ED04CB72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsWindow.USER32(01705B40), ref: 00D8B6A5
                                                          • IsWindowEnabled.USER32(01705B40), ref: 00D8B6B1
                                                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00D8B795
                                                          • SendMessageW.USER32(01705B40,000000B0,?,?), ref: 00D8B7CC
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 00D8B809
                                                          • GetWindowLongW.USER32(01705B40,000000EC), ref: 00D8B82B
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00D8B843
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: 35f4e296eb801733696260ed13dddf3ddfe59a139ce7303b707894dfa5303f03
                                                          • Instruction ID: f2606ad92c60693d6bf394fc5ff4c8dee29742f0ace3a5c827da0ab2527d0b51
                                                          • Opcode Fuzzy Hash: 35f4e296eb801733696260ed13dddf3ddfe59a139ce7303b707894dfa5303f03
                                                          • Instruction Fuzzy Hash: 82718E74600305AFDB20AF65CC95FBA7BB9EF89320F18446AE9459B3A1D731AC41CB74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D7F75C
                                                          • _memset.LIBCMT ref: 00D7F825
                                                          • ShellExecuteExW.SHELL32(?), ref: 00D7F86A
                                                            • Part of subcall function 00D09997: __itow.LIBCMT ref: 00D099C2
                                                            • Part of subcall function 00D09997: __swprintf.LIBCMT ref: 00D09A0C
                                                            • Part of subcall function 00D1FEC6: _wcscpy.LIBCMT ref: 00D1FEE9
                                                          • GetProcessId.KERNEL32(00000000), ref: 00D7F8E1
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D7F910
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                          • String ID: @
                                                          • API String ID: 3522835683-2766056989
                                                          • Opcode ID: 3315129aefcc2bd3b05a13c1928c06fee3f68429136c73d80c45d1361a045333
                                                          • Instruction ID: 70c77442be59687fca448919087512cb2f4dbfb47bf2afe1e247abcfe6402bdd
                                                          • Opcode Fuzzy Hash: 3315129aefcc2bd3b05a13c1928c06fee3f68429136c73d80c45d1361a045333
                                                          • Instruction Fuzzy Hash: 84616EB5A00619DFCB14DF68D591AAEBBF5FF48310B148469E849AB391DB30AD40CFB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetParent.USER32(?), ref: 00D6149C
                                                          • GetKeyboardState.USER32(?), ref: 00D614B1
                                                          • SetKeyboardState.USER32(?), ref: 00D61512
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00D61540
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00D6155F
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00D615A5
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00D615C8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: c1a4fb62f2789bd9bfd2abd84d9f9c294ef1bf61111aa8ce740cb308c0832502
                                                          • Instruction ID: babb81d09cb6f285d2cc0c2a54e5f583cc9ded1d0de324313b3a3d157b760793
                                                          • Opcode Fuzzy Hash: c1a4fb62f2789bd9bfd2abd84d9f9c294ef1bf61111aa8ce740cb308c0832502
                                                          • Instruction Fuzzy Hash: 5E51E3B4A047D53FFB324674CC45BBABEA9AB46304F0C8589E1D6868D2C794EC88D770
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 00D612B5
                                                          • GetKeyboardState.USER32(?), ref: 00D612CA
                                                          • SetKeyboardState.USER32(?), ref: 00D6132B
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00D61357
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00D61374
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00D613B8
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00D613D9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: aaaf23fe007c9233fd9e2c3bf0aee0eabade5ce4ce6cbd2a8527af33db9afda9
                                                          • Instruction ID: 2abb5785efbbce3a93a541260816a2459a17373637c6262deda47ef10b119c9b
                                                          • Opcode Fuzzy Hash: aaaf23fe007c9233fd9e2c3bf0aee0eabade5ce4ce6cbd2a8527af33db9afda9
                                                          • Instruction Fuzzy Hash: 9C5123A49043D53FFB3283248C51B7ABFA9AB06300F0C8589E1D5869C2D794EC88E770
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _wcsncpy$LocalTime
                                                          • String ID:
                                                          • API String ID: 2945705084-0
                                                          • Opcode ID: 0f4f32b580905d11946f49fd94bca820b5dcd269830f5ad544928b3fd5f685b6
                                                          • Instruction ID: af07b6e3725dc45e7321bd4a17298cf65a6b27b2b46d4f1988e2fdd55514d576
                                                          • Opcode Fuzzy Hash: 0f4f32b580905d11946f49fd94bca820b5dcd269830f5ad544928b3fd5f685b6
                                                          • Instruction Fuzzy Hash: 57418165C20628B6CB10EBF8EC869DFB3A8DF15310F508956F918E3121E634E755C7B9
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D648AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00D638D3,?), ref: 00D648C7
                                                            • Part of subcall function 00D648AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00D638D3,?), ref: 00D648E0
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00D638F3
                                                          • _wcscmp.LIBCMT ref: 00D6390F
                                                          • MoveFileW.KERNEL32(?,?), ref: 00D63927
                                                          • _wcscat.LIBCMT ref: 00D6396F
                                                          • SHFileOperationW.SHELL32(?), ref: 00D639DB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 1377345388-1173974218
                                                          • Opcode ID: cb9b088bb0a13b1a054e8b29cbcd608e7d10ddf8c6389962c46f5a0a796dbd39
                                                          • Instruction ID: 65bcadaa938a2dfd9d32dd03d4ac4d9d036e7f14e3e6d3fae451994897047a96
                                                          • Opcode Fuzzy Hash: cb9b088bb0a13b1a054e8b29cbcd608e7d10ddf8c6389962c46f5a0a796dbd39
                                                          • Instruction Fuzzy Hash: 92418F725083449BD755EF64D481AEBB7E8EF89340F04092EB48AC3251EA75D788CF72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D87519
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D875C0
                                                          • IsMenu.USER32(?), ref: 00D875D8
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00D87620
                                                          • DrawMenuBar.USER32 ref: 00D87633
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert_memset
                                                          • String ID: 0
                                                          • API String ID: 3866635326-4108050209
                                                          • Opcode ID: 84aef648e46ae8814eb6f9a79870a416f6f48bbc2a960b86469cf912bb68e0f3
                                                          • Instruction ID: c902c5497fdf7e759f29020a828514ae391ad64dbc68ce8443290fa1c234861e
                                                          • Opcode Fuzzy Hash: 84aef648e46ae8814eb6f9a79870a416f6f48bbc2a960b86469cf912bb68e0f3
                                                          • Instruction Fuzzy Hash: F0412875A04609AFDB10EF54D885E9ABBF8FF05314F188169E955A7390D730ED50CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00D8125C
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D81286
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00D8133D
                                                            • Part of subcall function 00D8122D: RegCloseKey.ADVAPI32(?), ref: 00D812A3
                                                            • Part of subcall function 00D8122D: FreeLibrary.KERNEL32(?), ref: 00D812F5
                                                            • Part of subcall function 00D8122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00D81318
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00D812E0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                          • String ID:
                                                          • API String ID: 395352322-0
                                                          • Opcode ID: 55127139aa76cf2db09604e0d6415acd97c374d2f50f295ab36eaa2c5e42b61c
                                                          • Instruction ID: 963c9cc1b4471b8015e5b139b0e3f722addbfe10e1249488d62443fcb5394606
                                                          • Opcode Fuzzy Hash: 55127139aa76cf2db09604e0d6415acd97c374d2f50f295ab36eaa2c5e42b61c
                                                          • Instruction Fuzzy Hash: 2B312FB5911219BFDB14AF90DC89EFEB7BCEF08300F140169E505E2251DA749E8A9BB4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00D8655B
                                                          • GetWindowLongW.USER32(01705B40,000000F0), ref: 00D8658E
                                                          • GetWindowLongW.USER32(01705B40,000000F0), ref: 00D865C3
                                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00D865F5
                                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00D8661F
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00D86630
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00D8664A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: 847c6f8615df83117c893e10891cc6074e90d324a74cdc55379d03c0d971c6b6
                                                          • Instruction ID: c5a593a7e6a7fd4d4411dca99b72a5390c8f1f96bff5d8e07ed41ca5fa4ceb94
                                                          • Opcode Fuzzy Hash: 847c6f8615df83117c893e10891cc6074e90d324a74cdc55379d03c0d971c6b6
                                                          • Instruction Fuzzy Hash: C031F270604251AFDB21DF18DC86F553BE1FB4A720F1902A8F511CB2F5DB61E840DB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D780A0: inet_addr.WSOCK32(00000000), ref: 00D780CB
                                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 00D764D9
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00D764E8
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00D76521
                                                          • connect.WSOCK32(00000000,?,00000010), ref: 00D7652A
                                                          • WSAGetLastError.WSOCK32 ref: 00D76534
                                                          • closesocket.WSOCK32(00000000), ref: 00D7655D
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00D76576
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 910771015-0
                                                          • Opcode ID: 409e078fce60c550b450014899c12600e23beab253c8b1480b94857da30372fb
                                                          • Instruction ID: 853806b9c01a28e70dfe12e6cfa7555ced0b612aa4e065ae6e920dfb3343ece6
                                                          • Opcode Fuzzy Hash: 409e078fce60c550b450014899c12600e23beab253c8b1480b94857da30372fb
                                                          • Instruction Fuzzy Hash: FD319E71600618AFDB10AF24CC85BBE7BB9EB44714F048029FD49D7291EB70E904DBB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D5E0FA
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D5E120
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00D5E123
                                                          • SysAllocString.OLEAUT32 ref: 00D5E144
                                                          • SysFreeString.OLEAUT32 ref: 00D5E14D
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00D5E167
                                                          • SysAllocString.OLEAUT32(?), ref: 00D5E175
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: b1ba17a3e4ece08981095f2494647079e089f3e8a17829bb933021391504ad8a
                                                          • Instruction ID: 6897d0314c4f395c7c14de8fec53b9e5f98df61c18183b048c24c07b6e58702d
                                                          • Opcode Fuzzy Hash: b1ba17a3e4ece08981095f2494647079e089f3e8a17829bb933021391504ad8a
                                                          • Instruction Fuzzy Hash: 1B21AF75200718AF9F14AFACDC88CAB77ECEB197A1B148126FD54CB2A0DA70DD458B70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 1038674560-2734436370
                                                          • Opcode ID: 57340d2a5078340bc69e2fe2639f59df4de5f1598003782cd971a1b905e4697f
                                                          • Instruction ID: f78a4ac4d87cb6c4998d829ec100fd480a68e20a19d05bd7853161e88477f80f
                                                          • Opcode Fuzzy Hash: 57340d2a5078340bc69e2fe2639f59df4de5f1598003782cd971a1b905e4697f
                                                          • Instruction Fuzzy Hash: AE214972204265AADB30A734ED52FBB7398DF61345F188035FC868F181EB51ED89D2B1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D01D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00D01D73
                                                            • Part of subcall function 00D01D35: GetStockObject.GDI32(00000011), ref: 00D01D87
                                                            • Part of subcall function 00D01D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00D01D91
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00D878A1
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00D878AE
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00D878B9
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00D878C8
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00D878D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: b4e479518144417fa93f9ac37b3fe93bd97554eb58aff09195f68c5731078fe4
                                                          • Instruction ID: 4bb41ee533980245280b63a3afd4ab284322ce0ef2972ae3725da5c9e3c9d5c4
                                                          • Opcode Fuzzy Hash: b4e479518144417fa93f9ac37b3fe93bd97554eb58aff09195f68c5731078fe4
                                                          • Instruction Fuzzy Hash: 141190B211021ABFEF159F60CC85EE77F6DEF08768F114115BA04A2090CB72AC21DBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00D24292,?), ref: 00D241E3
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00D241EA
                                                          • EncodePointer.KERNEL32(00000000), ref: 00D241F6
                                                          • DecodePointer.KERNEL32(00000001,00D24292,?), ref: 00D24213
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                          • String ID: RoInitialize$combase.dll
                                                          • API String ID: 3489934621-340411864
                                                          • Opcode ID: 4afeddb96d8665b8d9e336a0eea7665fb5b2852d7c56143d6f36144ed89c0688
                                                          • Instruction ID: a6bc150e55a64956966d536813c98ae7716b0056e77d660b891dd52ba650f2cd
                                                          • Opcode Fuzzy Hash: 4afeddb96d8665b8d9e336a0eea7665fb5b2852d7c56143d6f36144ed89c0688
                                                          • Instruction Fuzzy Hash: 06E01AB0AA0302AEEF215BB1EC1DF143AA4BB20B06F144424F851D52A0DBB540959F74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00D241B8), ref: 00D242B8
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00D242BF
                                                          • EncodePointer.KERNEL32(00000000), ref: 00D242CA
                                                          • DecodePointer.KERNEL32(00D241B8), ref: 00D242E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                          • String ID: RoUninitialize$combase.dll
                                                          • API String ID: 3489934621-2819208100
                                                          • Opcode ID: 158830216f177518c3d406ab9c06739bb035d68597a87a893fc3885dd03c481f
                                                          • Instruction ID: 0c8d6e3eb437056c968f24b5173a5453e33e422cd80767a9ee649cd2fb735b82
                                                          • Opcode Fuzzy Hash: 158830216f177518c3d406ab9c06739bb035d68597a87a893fc3885dd03c481f
                                                          • Instruction Fuzzy Hash: 2EE0B6786A1312EFEB109B61FD1DF563AA4BB24B46F184024F451E12A0CBB54544DB78
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memmove$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 3253778849-0
                                                          • Opcode ID: 2ac74d2e030658137b5ee0dcb8b02025e330d3075783c8fac3e9a08f62e1acb0
                                                          • Instruction ID: 879d81ff11e2fb58a69cf831af2609c655ff34158bfa7ea162093a141941ea14
                                                          • Opcode Fuzzy Hash: 2ac74d2e030658137b5ee0dcb8b02025e330d3075783c8fac3e9a08f62e1acb0
                                                          • Instruction Fuzzy Hash: 51619A3050029AABCF11EF64D892FFE7BA4EF54308F044519F8996B2D2DA30E945CBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                            • Part of subcall function 00D810A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D80038,?,?), ref: 00D810BC
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D80548
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D80588
                                                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00D805AB
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00D805D4
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00D80617
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D80624
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                          • String ID:
                                                          • API String ID: 4046560759-0
                                                          • Opcode ID: b67998b3aa30e279f82ee8f4c38a0492bd5188cf16c642027f02b3c83af8121a
                                                          • Instruction ID: 9bd5e336f4b10f8d7273e67f32482d272cb0ba93ac214aef19c2ddc65f3d4f8f
                                                          • Opcode Fuzzy Hash: b67998b3aa30e279f82ee8f4c38a0492bd5188cf16c642027f02b3c83af8121a
                                                          • Instruction Fuzzy Hash: A3513931608240AFCB14EB64D885E6FBBE8FF88714F04495DF995972A1DB31E909CB72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetMenu.USER32(?), ref: 00D85A82
                                                          • GetMenuItemCount.USER32(00000000), ref: 00D85AB9
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00D85AE1
                                                          • GetMenuItemID.USER32(?,?), ref: 00D85B50
                                                          • GetSubMenu.USER32(?,?), ref: 00D85B5E
                                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 00D85BAF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountMessagePostString
                                                          • String ID:
                                                          • API String ID: 650687236-0
                                                          • Opcode ID: c5e01b7735c8ee68cf23043f75ad3af45a8ecd79fcdd2515879e0c01e7ffe462
                                                          • Instruction ID: ba5e308d256eca9bcd2ff7b24ad5f2a81fa5d5ef66018746a4ec62c23b6bb879
                                                          • Opcode Fuzzy Hash: c5e01b7735c8ee68cf23043f75ad3af45a8ecd79fcdd2515879e0c01e7ffe462
                                                          • Instruction Fuzzy Hash: 94519D31A00615EFCF15EFA4D885AAEB7B5EF58320F1440A9E845BB351CB30BE408BB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00D5F3F7
                                                          • VariantClear.OLEAUT32(00000013), ref: 00D5F469
                                                          • VariantClear.OLEAUT32(00000000), ref: 00D5F4C4
                                                          • _memmove.LIBCMT ref: 00D5F4EE
                                                          • VariantClear.OLEAUT32(?), ref: 00D5F53B
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00D5F569
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType_memmove
                                                          • String ID:
                                                          • API String ID: 1101466143-0
                                                          • Opcode ID: 745791d572d937b8df30b429cf8f6d85e1766a5288b3ad04bc2885680aa2508a
                                                          • Instruction ID: 66106cffd53e7e61841b8ef72e31a6f61561bdaf08c56427bd1e7b64be17df7e
                                                          • Opcode Fuzzy Hash: 745791d572d937b8df30b429cf8f6d85e1766a5288b3ad04bc2885680aa2508a
                                                          • Instruction Fuzzy Hash: 7A5168B5A00209EFCB10CF58D884EAAB7B8FF4C354B15856AED59DB340E730E915CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D62747
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D62792
                                                          • IsMenu.USER32(00000000), ref: 00D627B2
                                                          • CreatePopupMenu.USER32 ref: 00D627E6
                                                          • GetMenuItemCount.USER32(000000FF), ref: 00D62844
                                                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00D62875
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                          • String ID:
                                                          • API String ID: 3311875123-0
                                                          • Opcode ID: 6480362d937c4f8ea9527929d0f595b6db4b3f8f3a42082541e6fb3dc9e2d6c4
                                                          • Instruction ID: 0a00a7dd29a0c58cebb4b9f3d8635b495bfb4f3d130b4de08fe6dff82489fe7c
                                                          • Opcode Fuzzy Hash: 6480362d937c4f8ea9527929d0f595b6db4b3f8f3a42082541e6fb3dc9e2d6c4
                                                          • Instruction Fuzzy Hash: E2518C70A00B0AEBDF24CF68DC88ABEBBF5EF54314F184169E8519B291D7709944CBB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D02612: GetWindowLongW.USER32(?,000000EB), ref: 00D02623
                                                          • BeginPaint.USER32(?,?,?,?,?,?), ref: 00D0179A
                                                          • GetWindowRect.USER32(?,?), ref: 00D017FE
                                                          • ScreenToClient.USER32(?,?), ref: 00D0181B
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00D0182C
                                                          • EndPaint.USER32(?,?), ref: 00D01876
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                          • String ID:
                                                          • API String ID: 1827037458-0
                                                          • Opcode ID: a2ed632a6b16e1c16dfd24e3a3da220864ab5eb5b0b85ce115032537ce0e0e00
                                                          • Instruction ID: c40e43c356029718bf6106703af3b8853feabd08c9c82b7b91ed5b05595cb571
                                                          • Opcode Fuzzy Hash: a2ed632a6b16e1c16dfd24e3a3da220864ab5eb5b0b85ce115032537ce0e0e00
                                                          • Instruction Fuzzy Hash: 00418874100302AFD710DF24C889FBA7BE8EB49724F084629FAA8C62E1C771D945DB71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ShowWindow.USER32(00DC67B0,00000000,01705B40,?,?,00DC67B0,?,00D8B862,?,?), ref: 00D8B9CC
                                                          • EnableWindow.USER32(00000000,00000000), ref: 00D8B9F0
                                                          • ShowWindow.USER32(00DC67B0,00000000,01705B40,?,?,00DC67B0,?,00D8B862,?,?), ref: 00D8BA50
                                                          • ShowWindow.USER32(00000000,00000004,?,00D8B862,?,?), ref: 00D8BA62
                                                          • EnableWindow.USER32(00000000,00000001), ref: 00D8BA86
                                                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00D8BAA9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: 506d0fcd495fefd27b04e9aff64c790900d8c9bce731228606f1bb0b485358a4
                                                          • Instruction ID: 52ec312ce591e9c87603312d886d5385e5938390a05309d88185e93041f65b44
                                                          • Opcode Fuzzy Hash: 506d0fcd495fefd27b04e9aff64c790900d8c9bce731228606f1bb0b485358a4
                                                          • Instruction Fuzzy Hash: 87415030600641AFDB25EF15C489B957BE0FF05320F1C42BAEA588F2A2C771A845CF71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,?,?,?,?,00D75134,?,?,00000000,00000001), ref: 00D773BF
                                                            • Part of subcall function 00D73C94: GetWindowRect.USER32(?,?), ref: 00D73CA7
                                                          • GetDesktopWindow.USER32 ref: 00D773E9
                                                          • GetWindowRect.USER32(00000000), ref: 00D773F0
                                                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00D77422
                                                            • Part of subcall function 00D654E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00D6555E
                                                          • GetCursorPos.USER32(?), ref: 00D7744E
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00D774AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                          • String ID:
                                                          • API String ID: 4137160315-0
                                                          • Opcode ID: bd04c38a2280395bebeaed1905e4b61745c02601b5723f2c055c97ef747cfd5e
                                                          • Instruction ID: ec7d288fb5387c806a5aa5b4b732910395ef5afc8036c87608dae42c604282dc
                                                          • Opcode Fuzzy Hash: bd04c38a2280395bebeaed1905e4b61745c02601b5723f2c055c97ef747cfd5e
                                                          • Instruction Fuzzy Hash: 1C31B272508305ABD720DF54D849F9BBBE9FF88318F004919F589E7291DB30E958CBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D585F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00D58608
                                                            • Part of subcall function 00D585F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00D58612
                                                            • Part of subcall function 00D585F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00D58621
                                                            • Part of subcall function 00D585F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00D58628
                                                            • Part of subcall function 00D585F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00D5863E
                                                          • GetLengthSid.ADVAPI32(?,00000000,00D58977), ref: 00D58DAC
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00D58DB8
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00D58DBF
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 00D58DD8
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,00D58977), ref: 00D58DEC
                                                          • HeapFree.KERNEL32(00000000), ref: 00D58DF3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: 5260ebfa349cba315850c3c3b1f2501405f79acdda71f66ab06bc84dda7d7943
                                                          • Instruction ID: d70bc8e7653d31896d367b593496b66e4f393b0d02ba8705c72afde4bc344882
                                                          • Opcode Fuzzy Hash: 5260ebfa349cba315850c3c3b1f2501405f79acdda71f66ab06bc84dda7d7943
                                                          • Instruction Fuzzy Hash: 71119A71510705EFDF109BA4CC49BAE7BB9EB55316F14402AEC85E7250DB369908EB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00D58B2A
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00D58B31
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00D58B40
                                                          • CloseHandle.KERNEL32(00000004), ref: 00D58B4B
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00D58B7A
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00D58B8E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: fd43713fca2abb76f3f5b0891056677700c5aa479cba58c06d9749f5c96f8063
                                                          • Instruction ID: 951138cfb43cf253e5c9ecb4e228dd03d1e44ab290b725bf4deb378afe59b0e4
                                                          • Opcode Fuzzy Hash: fd43713fca2abb76f3f5b0891056677700c5aa479cba58c06d9749f5c96f8063
                                                          • Instruction Fuzzy Hash: B31159B2600209ABDF018FA4ED49FDE7BADEF08305F184064FE04E2160C7769D65AB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D012F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00D0134D
                                                            • Part of subcall function 00D012F3: SelectObject.GDI32(?,00000000), ref: 00D0135C
                                                            • Part of subcall function 00D012F3: BeginPath.GDI32(?), ref: 00D01373
                                                            • Part of subcall function 00D012F3: SelectObject.GDI32(?,00000000), ref: 00D0139C
                                                          • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00D8C1C4
                                                          • LineTo.GDI32(00000000,00000003,?), ref: 00D8C1D8
                                                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00D8C1E6
                                                          • LineTo.GDI32(00000000,00000000,?), ref: 00D8C1F6
                                                          • EndPath.GDI32(00000000), ref: 00D8C206
                                                          • StrokePath.GDI32(00000000), ref: 00D8C216
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: c54826a167e5e7b76d799cfb7a5ade3383a15a915b05a73a50497fa6efb581ec
                                                          • Instruction ID: c869790fe860ffa902afcac9a5a19fde1b18da95557c993519afc26e281bb516
                                                          • Opcode Fuzzy Hash: c54826a167e5e7b76d799cfb7a5ade3383a15a915b05a73a50497fa6efb581ec
                                                          • Instruction Fuzzy Hash: 1811097640020DFFDB119F90DC88FAA7FADEF08354F048021BA188A2A1C7719D55DBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00D203D3
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00D203DB
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00D203E6
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00D203F1
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00D203F9
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D20401
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: ac96c471a622d5722cc5aff874232fa839e4460f63df440453bcd8e969cddb27
                                                          • Instruction ID: 08f8e89c274a4a3b750ac1d25f8c4dc3fa3c87c494b794dd95e7efe7c0caa551
                                                          • Opcode Fuzzy Hash: ac96c471a622d5722cc5aff874232fa839e4460f63df440453bcd8e969cddb27
                                                          • Instruction Fuzzy Hash: ED016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C87A41C7F5A864CBE5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00D6569B
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00D656B1
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00D656C0
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D656CF
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D656D9
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D656E0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: 0df30f9ec7544dc033507904e13df788d7fff81917d0408a64ccaa406dcb4d4b
                                                          • Instruction ID: 7d9d5f9840ce74773ada88758a3a5ad342d6c1def4a2d4dd4ea48feefa4d8d1a
                                                          • Opcode Fuzzy Hash: 0df30f9ec7544dc033507904e13df788d7fff81917d0408a64ccaa406dcb4d4b
                                                          • Instruction Fuzzy Hash: 3AF03032251258BBE7215BA2EC0EEEF7B7CEFCAB11F000269FA04D1150E7A11A11C7B5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,?), ref: 00D674E5
                                                          • EnterCriticalSection.KERNEL32(?,?,00D11044,?,?), ref: 00D674F6
                                                          • TerminateThread.KERNEL32(00000000,000001F6,?,00D11044,?,?), ref: 00D67503
                                                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00D11044,?,?), ref: 00D67510
                                                            • Part of subcall function 00D66ED7: CloseHandle.KERNEL32(00000000,?,00D6751D,?,00D11044,?,?), ref: 00D66EE1
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00D67523
                                                          • LeaveCriticalSection.KERNEL32(?,?,00D11044,?,?), ref: 00D6752A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: a8395673de72d471a763058feee4186e72f36a62ee743daccb685f5c662daf72
                                                          • Instruction ID: c0674719b5cef8af41c763184b1bbf49d01d14a68ad230cfad4222029abb0bef
                                                          • Opcode Fuzzy Hash: a8395673de72d471a763058feee4186e72f36a62ee743daccb685f5c662daf72
                                                          • Instruction Fuzzy Hash: 8CF05E7A150712EBDB111B64FC8CAEB772AEF45312B140572F243D11B1DB755811CB74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00D58E7F
                                                          • UnloadUserProfile.USERENV(?,?), ref: 00D58E8B
                                                          • CloseHandle.KERNEL32(?), ref: 00D58E94
                                                          • CloseHandle.KERNEL32(?), ref: 00D58E9C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00D58EA5
                                                          • HeapFree.KERNEL32(00000000), ref: 00D58EAC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: 95cdc449b35c01dfa783633d2ae47945b7a4d8c89f9b1f8f2504ccfb8932cedd
                                                          • Instruction ID: c2c67abea303c5aeab87cef3f608bfc023d66a847c218cf341cc5a9023e968d2
                                                          • Opcode Fuzzy Hash: 95cdc449b35c01dfa783633d2ae47945b7a4d8c89f9b1f8f2504ccfb8932cedd
                                                          • Instruction Fuzzy Hash: 61E0C276014201FBDA011FE1EC0C90ABB69FB99322B108230F219C1274CB32A421DB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00D78928
                                                          • CharUpperBuffW.USER32(?,?), ref: 00D78A37
                                                          • VariantClear.OLEAUT32(?), ref: 00D78BAF
                                                            • Part of subcall function 00D67804: VariantInit.OLEAUT32(00000000), ref: 00D67844
                                                            • Part of subcall function 00D67804: VariantCopy.OLEAUT32(00000000,?), ref: 00D6784D
                                                            • Part of subcall function 00D67804: VariantClear.OLEAUT32(00000000), ref: 00D67859
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4237274167-1221869570
                                                          • Opcode ID: a4ff42e0e405296ebc34a0f82d054d1b8e42285a494f6c0799aad0bcfaee702c
                                                          • Instruction ID: 848c83203e5cc7c7cd3b94f785ea80abac3127cee7c1f57374fd29bca9dcce52
                                                          • Opcode Fuzzy Hash: a4ff42e0e405296ebc34a0f82d054d1b8e42285a494f6c0799aad0bcfaee702c
                                                          • Instruction Fuzzy Hash: 769150716443019FC710DF28C49595BBBE4EF89314F14896EF89A8B3A2EB31E945CB72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D1FEC6: _wcscpy.LIBCMT ref: 00D1FEE9
                                                          • _memset.LIBCMT ref: 00D63077
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D630A6
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D63159
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00D63187
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                          • String ID: 0
                                                          • API String ID: 4152858687-4108050209
                                                          • Opcode ID: c7016d43c90c29b7fd4a194f9a40f94bd9b92281b8fa3280611df06b200c1c98
                                                          • Instruction ID: c3b1fbc98bbf623e9951591f1e8f4cb76aa1e10999a09946998af1f78f30e8e4
                                                          • Opcode Fuzzy Hash: c7016d43c90c29b7fd4a194f9a40f94bd9b92281b8fa3280611df06b200c1c98
                                                          • Instruction Fuzzy Hash: 0B51A0316083019FD7259F28D845A6BBBE8EF66360F08492DF895D32D1DB74CE4887B2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00D5DAC5
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00D5DAFB
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00D5DB0C
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00D5DB8E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: feb8245b00dbbeebc0a20e492247fe643ecffc19df95ccc73fb45292a2d807cb
                                                          • Instruction ID: 1812be66a6df45ffc68185fba3a3f802572b10167b30e0b93ac3fae654f82d1d
                                                          • Opcode Fuzzy Hash: feb8245b00dbbeebc0a20e492247fe643ecffc19df95ccc73fb45292a2d807cb
                                                          • Instruction Fuzzy Hash: 494150B1600204EFDF25CF54C884AAABBBBEF48351F1580A9AD059F215D7B1D948CBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D62CAF
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00D62CCB
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00D62D11
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00DC6890,00000000), ref: 00D62D5A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem_memset
                                                          • String ID: 0
                                                          • API String ID: 1173514356-4108050209
                                                          • Opcode ID: 9aac85686b8daa40cf52b2ef63636729e8ad3dd2fdc50d4c8bef83344e58be0a
                                                          • Instruction ID: 39447e25d3f536e10495092d62dc97e041e92d403d9edf0521579a7ffa6d2ddf
                                                          • Opcode Fuzzy Hash: 9aac85686b8daa40cf52b2ef63636729e8ad3dd2fdc50d4c8bef83344e58be0a
                                                          • Instruction Fuzzy Hash: 1B418030205702AFD720DF24C845B6ABBE8EF85320F18466DF9A5972D1D770E904CBB2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00D7DAD9
                                                            • Part of subcall function 00D079AB: _memmove.LIBCMT ref: 00D079F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower_memmove
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 3425801089-567219261
                                                          • Opcode ID: 424a7bd7df25d42cb449121c942475a63b6ae2f0f7c2adb08711cfe871f0152e
                                                          • Instruction ID: acded0ada2f93dc098d8a8f822769f07e481012a3c9a74e384e5dea970954e38
                                                          • Opcode Fuzzy Hash: 424a7bd7df25d42cb449121c942475a63b6ae2f0f7c2adb08711cfe871f0152e
                                                          • Instruction Fuzzy Hash: CD318370904619EFCF10EF54C8819EEB7B5FF15320B10862AE86A977D2DB71A905CBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                            • Part of subcall function 00D5B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00D5B0E7
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00D593F6
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00D59409
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00D59439
                                                            • Part of subcall function 00D07D2C: _memmove.LIBCMT ref: 00D07D66
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_memmove$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 365058703-1403004172
                                                          • Opcode ID: f3527ad905fd74b11a11e87376f7f87f58727c53d3d685539cc491bfed365847
                                                          • Instruction ID: 40317ac8ecc77ef1999254dbce40111dc4f37a574c6000a4b02a748b30ce7295
                                                          • Opcode Fuzzy Hash: f3527ad905fd74b11a11e87376f7f87f58727c53d3d685539cc491bfed365847
                                                          • Instruction Fuzzy Hash: 5A21F071A00108EEDF14AB64DC969FFBB68DF05320B144229FD26972E0DB345E0E8A30
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D01D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00D01D73
                                                            • Part of subcall function 00D01D35: GetStockObject.GDI32(00000011), ref: 00D01D87
                                                            • Part of subcall function 00D01D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00D01D91
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00D866D0
                                                          • LoadLibraryW.KERNEL32(?), ref: 00D866D7
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00D866EC
                                                          • DestroyWindow.USER32(?), ref: 00D866F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                          • String ID: SysAnimate32
                                                          • API String ID: 4146253029-1011021900
                                                          • Opcode ID: f4fdde722a23752eb8cfe26365b23c61a5845c8898760d26a2e76ce3a640240d
                                                          • Instruction ID: 217843ab440142af8f510381374ae338117cb82f0aeeca267226e0100b770d23
                                                          • Opcode Fuzzy Hash: f4fdde722a23752eb8cfe26365b23c61a5845c8898760d26a2e76ce3a640240d
                                                          • Instruction Fuzzy Hash: 14218B71200246ABEF106F64EC82EBB37ADEF59378F144629FA51D2190E771CC519770
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00D6705E
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00D67091
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00D670A3
                                                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00D670DD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 41294a5a59ff6834ffb20e80047ddbde237ea2749547f4972440c6e5c0061729
                                                          • Instruction ID: 2814ef1b8271df9e572dba004cde92f25f3326b73baa963c7ffba22ae7d0c9f6
                                                          • Opcode Fuzzy Hash: 41294a5a59ff6834ffb20e80047ddbde237ea2749547f4972440c6e5c0061729
                                                          • Instruction Fuzzy Hash: B4215C74608309ABDB209F28DC05A9A77B8BF44728F244A29FCA1D72D0E771D8508B70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00D6712B
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00D6715D
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00D6716E
                                                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00D671A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 3e27083e7fb5c0854d34c7b71ee422550e046a49c5c5fa58f3d203365614d539
                                                          • Instruction ID: f247670797804e3d6fb298475f7150b796df4ddd34e26def480fa9727b8e912e
                                                          • Opcode Fuzzy Hash: 3e27083e7fb5c0854d34c7b71ee422550e046a49c5c5fa58f3d203365614d539
                                                          • Instruction Fuzzy Hash: F921A175604309ABDB209F689C04A9AB7A8AF56738F24061AFCB1D32D0D77498418B70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00D6AEBF
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00D6AF13
                                                          • __swprintf.LIBCMT ref: 00D6AF2C
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,00D8F910), ref: 00D6AF6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume__swprintf
                                                          • String ID: %lu
                                                          • API String ID: 3164766367-685833217
                                                          • Opcode ID: 3e813801fb3682313041bb4b7aa11163c20bcf9646181bc063488274a2d7f974
                                                          • Instruction ID: 0d7cd760328b637fd7b8917026e7a5f4740b0a53df398c4d79f2ce677483d75a
                                                          • Opcode Fuzzy Hash: 3e813801fb3682313041bb4b7aa11163c20bcf9646181bc063488274a2d7f974
                                                          • Instruction Fuzzy Hash: 59217435600209AFCB10EF65D885EAEB7B8EF49714B004069F909EB252DB31EA45CB31
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D07D2C: _memmove.LIBCMT ref: 00D07D66
                                                            • Part of subcall function 00D5A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00D5A399
                                                            • Part of subcall function 00D5A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D5A3AC
                                                            • Part of subcall function 00D5A37C: GetCurrentThreadId.KERNEL32 ref: 00D5A3B3
                                                            • Part of subcall function 00D5A37C: AttachThreadInput.USER32(00000000), ref: 00D5A3BA
                                                          • GetFocus.USER32 ref: 00D5A554
                                                            • Part of subcall function 00D5A3C5: GetParent.USER32(?), ref: 00D5A3D3
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00D5A59D
                                                          • EnumChildWindows.USER32(?,00D5A615), ref: 00D5A5C5
                                                          • __swprintf.LIBCMT ref: 00D5A5DF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                          • String ID: %s%d
                                                          • API String ID: 1941087503-1110647743
                                                          • Opcode ID: 2c31ebe80090959265f73a50e5bb6703fee6829de48276e12569fc75c27a4b5f
                                                          • Instruction ID: 714ff8e1af6be58f9bedadc1dc254a799bd80d3561ab3929d6fac09b835dbaa1
                                                          • Opcode Fuzzy Hash: 2c31ebe80090959265f73a50e5bb6703fee6829de48276e12569fc75c27a4b5f
                                                          • Instruction Fuzzy Hash: 1411D271600218ABDF10BFA8DC86FEE3778EF48702F044175BD08AA192DA7059498B31
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00D62048
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 3964851224-769500911
                                                          • Opcode ID: ad8c317d749a11148c342989df410c519e0e81d30187162ece9bb0664b6299a3
                                                          • Instruction ID: f1d06c464c9e9c5802aad6a5856960ae6a78891a1aca582c5ecffd96cc35a761
                                                          • Opcode Fuzzy Hash: ad8c317d749a11148c342989df410c519e0e81d30187162ece9bb0664b6299a3
                                                          • Instruction Fuzzy Hash: BE112A3091021ADFCF00EFA8D8415FEB7B4FF25304B508569D856A7352EB326906CB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00D7EF1B
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00D7EF4B
                                                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00D7F07E
                                                          • CloseHandle.KERNEL32(?), ref: 00D7F0FF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                          • String ID:
                                                          • API String ID: 2364364464-0
                                                          • Opcode ID: ca7d48f70e7e1e27b4baee425cebb54167e89200e476b163f56e54c0e61c2254
                                                          • Instruction ID: a19838bda2cfd8d30c1e8fd50eee68912181b2c752273dc25725f3520ed62338
                                                          • Opcode Fuzzy Hash: ca7d48f70e7e1e27b4baee425cebb54167e89200e476b163f56e54c0e61c2254
                                                          • Instruction Fuzzy Hash: 3C814DB16047009FD720DF28C896B6AB7E5EF48720F54881DF999DB3D2DAB1AC408B61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                            • Part of subcall function 00D810A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D80038,?,?), ref: 00D810BC
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D80388
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D803C7
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00D8040E
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 00D8043A
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D80447
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                          • String ID:
                                                          • API String ID: 3440857362-0
                                                          • Opcode ID: 6a55dbb1c5afb7290b0af4ad788515b91d8b0c3faf834d13c98ec3ace79c6897
                                                          • Instruction ID: a672482085b0cb23fc9cf14b0e245c3cf086b4055515d6440dcbf85058caf5f7
                                                          • Opcode Fuzzy Hash: 6a55dbb1c5afb7290b0af4ad788515b91d8b0c3faf834d13c98ec3ace79c6897
                                                          • Instruction Fuzzy Hash: 2B512C71208204AFD704EF64D891F6EBBE8FF88714F44892DB59997291DB30E909CB72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D09997: __itow.LIBCMT ref: 00D099C2
                                                            • Part of subcall function 00D09997: __swprintf.LIBCMT ref: 00D09A0C
                                                          • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00D7DC3B
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00D7DCBE
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00D7DCDA
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00D7DD1B
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00D7DD35
                                                            • Part of subcall function 00D05B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00D67B20,?,?,00000000), ref: 00D05B8C
                                                            • Part of subcall function 00D05B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00D67B20,?,?,00000000,?,?), ref: 00D05BB0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 327935632-0
                                                          • Opcode ID: 052f8ddac11bbb504262342564ca484e9851cb81cace2cb36c65573e6ca63d66
                                                          • Instruction ID: 5906318c185207311c1c62f66970b2d3aadaba71996349a526afe77b3f9f6a5e
                                                          • Opcode Fuzzy Hash: 052f8ddac11bbb504262342564ca484e9851cb81cace2cb36c65573e6ca63d66
                                                          • Instruction Fuzzy Hash: B1511735A00205DFDB11EFA8C4949ADB7F5EF48310B18C069E859AB352DB70ED45CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00D6E88A
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00D6E8B3
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00D6E8F2
                                                            • Part of subcall function 00D09997: __itow.LIBCMT ref: 00D099C2
                                                            • Part of subcall function 00D09997: __swprintf.LIBCMT ref: 00D09A0C
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00D6E917
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00D6E91F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1389676194-0
                                                          • Opcode ID: 25edb94b60d3de7371567121e72cad23cd1833ae57d86ccae437d0af199e9a18
                                                          • Instruction ID: ba997eccb452e255a3a4c63fb0b08e09d290558eab6a5d79d79b60c8394b09fa
                                                          • Opcode Fuzzy Hash: 25edb94b60d3de7371567121e72cad23cd1833ae57d86ccae437d0af199e9a18
                                                          • Instruction Fuzzy Hash: AC510C39A10205DFCB01DF64D991AAEBBF5EF08314B148099E849AB3A2DB71ED11DF70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d3e7ec2edb87b630933c19901da6caf45b462094787654746fd8a0502617988d
                                                          • Instruction ID: 5f23acab6ed3c907442cd665df0effa86d798fd9d7bf81c0ce2711239282bd77
                                                          • Opcode Fuzzy Hash: d3e7ec2edb87b630933c19901da6caf45b462094787654746fd8a0502617988d
                                                          • Instruction Fuzzy Hash: 3241D275900214ABE720EFACCC48FA9BBA4EB09310F190166E855E72E1D770ED41DB71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00D02357
                                                          • ScreenToClient.USER32(00DC67B0,?), ref: 00D02374
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00D02399
                                                          • GetAsyncKeyState.USER32(00000002), ref: 00D023A7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: ffadbaaa2c530616728be4d9b6a3a3a1fb844732685a39e1baee55349d6e57ec
                                                          • Instruction ID: dc586e5a6f7292a7b44308e52ea8c3457c2034252a4d90963ce3cbe4a502810e
                                                          • Opcode Fuzzy Hash: ffadbaaa2c530616728be4d9b6a3a3a1fb844732685a39e1baee55349d6e57ec
                                                          • Instruction Fuzzy Hash: B8416E35504219FBDF159F68C848BEEBB74FB05324F24435AF868A22D0C7759950DBB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D5695D
                                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 00D569A9
                                                          • TranslateMessage.USER32(?), ref: 00D569D2
                                                          • DispatchMessageW.USER32(?), ref: 00D569DC
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D569EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                          • String ID:
                                                          • API String ID: 2108273632-0
                                                          • Opcode ID: 75771657da8316db54b1266ec87a45a22bd3481007672a2c5046dd6e9658f05d
                                                          • Instruction ID: 0e39a129f7e8d7534e18020848c0364088c4f18123973a6b2f446dc283b077ec
                                                          • Opcode Fuzzy Hash: 75771657da8316db54b1266ec87a45a22bd3481007672a2c5046dd6e9658f05d
                                                          • Instruction Fuzzy Hash: 9A31A171504247AADF208F74CC44FB6BBA8EB15306F584669EC61D32A1E635D88DDFB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00D58F12
                                                          • PostMessageW.USER32(?,00000201,00000001), ref: 00D58FBC
                                                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00D58FC4
                                                          • PostMessageW.USER32(?,00000202,00000000), ref: 00D58FD2
                                                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00D58FDA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: f7867367ff98168bfabb579af2be530cc5c476bc5dcbc9a7a88ab6674f94ade0
                                                          • Instruction ID: baae98d74a183235a2c461df5bf5b8a53e1d020bee9a0028d8390c9eff014e47
                                                          • Opcode Fuzzy Hash: f7867367ff98168bfabb579af2be530cc5c476bc5dcbc9a7a88ab6674f94ade0
                                                          • Instruction Fuzzy Hash: 5031DF71500219EBDF00CF68D94DAAE7BB6EF08316F104229FD25E72D0C7B09918EBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00D5B6C7
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00D5B6E4
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00D5B71C
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00D5B742
                                                          • _wcsstr.LIBCMT ref: 00D5B74C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                          • String ID:
                                                          • API String ID: 3902887630-0
                                                          • Opcode ID: 512befd6503dc5f4d797eb3032ebef6a4b0279a7903bb22d42ebc10acbbdb441
                                                          • Instruction ID: 2c458e4236c6544e93af9a57ea0a52cd979c09963a4214a6785e12adfe8e7747
                                                          • Opcode Fuzzy Hash: 512befd6503dc5f4d797eb3032ebef6a4b0279a7903bb22d42ebc10acbbdb441
                                                          • Instruction Fuzzy Hash: 52210731204344BAEF255B39AC4AE7B7B98DF59721F14802AFC05CA2A1EF61CC4097B0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D02612: GetWindowLongW.USER32(?,000000EB), ref: 00D02623
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D8B44C
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00D8B471
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00D8B489
                                                          • GetSystemMetrics.USER32(00000004), ref: 00D8B4B2
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00D71184,00000000), ref: 00D8B4D0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MetricsSystem
                                                          • String ID:
                                                          • API String ID: 2294984445-0
                                                          • Opcode ID: 129c3d03664c1b51e7f2b3be021c9ada836ff6387c652625cc1d9dc0db7f9211
                                                          • Instruction ID: cbe286d8663efd0de11b093953371ab05a56f10c4cd4f03562756da1a0213c10
                                                          • Opcode Fuzzy Hash: 129c3d03664c1b51e7f2b3be021c9ada836ff6387c652625cc1d9dc0db7f9211
                                                          • Instruction Fuzzy Hash: C6216071510256AFCB10AF3CCC05A7A3BA4FB05739B18472AF966D72E1E730D851DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D59802
                                                            • Part of subcall function 00D07D2C: _memmove.LIBCMT ref: 00D07D66
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00D59834
                                                          • __itow.LIBCMT ref: 00D5984C
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00D59874
                                                          • __itow.LIBCMT ref: 00D59885
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow$_memmove
                                                          • String ID:
                                                          • API String ID: 2983881199-0
                                                          • Opcode ID: 15190a532ab11352b4d1b6d4b87821c531860cf18fe26bbe0f40fefc7d7c5970
                                                          • Instruction ID: 9848ad4304cc335fed96b874d3fdc94168e91a67273e246e2b29b4ccf711e836
                                                          • Opcode Fuzzy Hash: 15190a532ab11352b4d1b6d4b87821c531860cf18fe26bbe0f40fefc7d7c5970
                                                          • Instruction Fuzzy Hash: EC21B371A00204EBDF10AB65CC96EEEBFA9EF5A721F080025FD05DB291D6709D4987F1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00D0134D
                                                          • SelectObject.GDI32(?,00000000), ref: 00D0135C
                                                          • BeginPath.GDI32(?), ref: 00D01373
                                                          • SelectObject.GDI32(?,00000000), ref: 00D0139C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 342b1b58d3a6d7b05ae8620bf7af2c8394332d41d517f8724882490c10558cfe
                                                          • Instruction ID: bc8ffa6bcc58e8e65869cb2bd2268f6d3598e6289eda32e3d4c890e7a11ea319
                                                          • Opcode Fuzzy Hash: 342b1b58d3a6d7b05ae8620bf7af2c8394332d41d517f8724882490c10558cfe
                                                          • Instruction Fuzzy Hash: F521397080030AEFDB109F65DC08BA97BA8EF00321F588226F918D62E0D371D895DFB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 43173f733d87f122da56d5b67202601a1d8982831d4b6463de3ec9754a9b2fa0
                                                          • Instruction ID: 2bafe2fb5019d02943c5c725e3a57ab9c4b6307e428f4fbadfc1a6277b77c851
                                                          • Opcode Fuzzy Hash: 43173f733d87f122da56d5b67202601a1d8982831d4b6463de3ec9754a9b2fa0
                                                          • Instruction Fuzzy Hash: 700192A16547157FEA14B6209C46EBF679CDB3139AB488021FD0496283EA60DE1982F1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00D64D5C
                                                          • __beginthreadex.LIBCMT ref: 00D64D7A
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 00D64D8F
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00D64DA5
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00D64DAC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                          • String ID:
                                                          • API String ID: 3824534824-0
                                                          • Opcode ID: 5303941d2e580247315de7e8ff20e838a3a5843a9c93eb32aa11deb0ecc368fa
                                                          • Instruction ID: 3170075b051a393eba9114bd52da0d1bcdbbeae380b4ff150a565575212e77fc
                                                          • Opcode Fuzzy Hash: 5303941d2e580247315de7e8ff20e838a3a5843a9c93eb32aa11deb0ecc368fa
                                                          • Instruction Fuzzy Hash: 0811E1B2904309BFC7119BA8DC08ADABBACEB85324F184265F915D3390D675CD448BB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D58766
                                                          • GetLastError.KERNEL32(?,00D5822A,?,?,?), ref: 00D58770
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00D5822A,?,?,?), ref: 00D5877F
                                                          • HeapAlloc.KERNEL32(00000000,?,00D5822A,?,?,?), ref: 00D58786
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D5879D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: a4415f24779362c69b165bfa30bfd8b0e03bb798f4594d82fde1b2c1bf84fe01
                                                          • Instruction ID: 81453aab930cfd48cdd151478b996685f06bc19a9fdd2151482a42b109301321
                                                          • Opcode Fuzzy Hash: a4415f24779362c69b165bfa30bfd8b0e03bb798f4594d82fde1b2c1bf84fe01
                                                          • Instruction Fuzzy Hash: 360146B1210704EFDB204FA6DC88D6B7BADFF9A756B200569FC49D2260DA318C14DB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00D65502
                                                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00D65510
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00D65518
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00D65522
                                                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00D6555E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 1fcca52cb7ced49ab762ef4adb2af644ad8bd4e5f6784783c644c94e39a69acc
                                                          • Instruction ID: b906d07aa979e533da332c7c35069ceb97b2eeda2d2c9a16632c60987219d13c
                                                          • Opcode Fuzzy Hash: 1fcca52cb7ced49ab762ef4adb2af644ad8bd4e5f6784783c644c94e39a69acc
                                                          • Instruction Fuzzy Hash: 8A013536C10B29DBCF00AFE8E88DAEDBB78BB09711F050456E942F2254DB30969087B1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D5758C,80070057,?,?,?,00D5799D), ref: 00D5766F
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D5758C,80070057,?,?), ref: 00D5768A
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D5758C,80070057,?,?), ref: 00D57698
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D5758C,80070057,?), ref: 00D576A8
                                                          • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D5758C,80070057,?,?), ref: 00D576B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 224a9aab87ea7e3000269834bd11fdc7fe987e1c4e9bd168ba7227d64928deab
                                                          • Instruction ID: 276bd5168ab48807504d17cb884f908d0055c0f7175845d95c7b8c881be39b5e
                                                          • Opcode Fuzzy Hash: 224a9aab87ea7e3000269834bd11fdc7fe987e1c4e9bd168ba7227d64928deab
                                                          • Instruction Fuzzy Hash: B90171B2611714ABDB105F58EC44AAA7BBDEB44B52F240028FD08D2321E731DD4497B0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00D58608
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00D58612
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00D58621
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00D58628
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00D5863E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 200fca89a68bea1839a43085baae04ca2ba750865db42afffd9ce6b564dda62b
                                                          • Instruction ID: 6e924f8ba451b354bdb79aff6da88cf87f76e8e7ccebbc26a2af1f20130b4b6e
                                                          • Opcode Fuzzy Hash: 200fca89a68bea1839a43085baae04ca2ba750865db42afffd9ce6b564dda62b
                                                          • Instruction Fuzzy Hash: 49F03771211304AFEB100FA5DCCEF6B3BACEF8A755B140429FD49D6260DA619C45EB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00D58669
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00D58673
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D58682
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00D58689
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D5869F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 170aaf9be44b1ad0946751f7e01215ee33be708a72d93c12d2e84ec22238cc1e
                                                          • Instruction ID: 83bc3157e032c7403a9a508986e5d78089dc924a40854064aa2add35aeb2dfde
                                                          • Opcode Fuzzy Hash: 170aaf9be44b1ad0946751f7e01215ee33be708a72d93c12d2e84ec22238cc1e
                                                          • Instruction Fuzzy Hash: 27F0A9B0210304EFEB211FA4EC88E6B3BACEF89755B180029FD49D2250DA609804EB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00D5C6BA
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00D5C6D1
                                                          • MessageBeep.USER32(00000000), ref: 00D5C6E9
                                                          • KillTimer.USER32(?,0000040A), ref: 00D5C705
                                                          • EndDialog.USER32(?,00000001), ref: 00D5C71F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 14c094d023428af919a4d3a1db05795280fb66a6cb5991b0554d1307b297753f
                                                          • Instruction ID: 8a3966ab4da4dac8a75db1df93fd6bf92c4fad6be83dcc321e8bf67263383ada
                                                          • Opcode Fuzzy Hash: 14c094d023428af919a4d3a1db05795280fb66a6cb5991b0554d1307b297753f
                                                          • Instruction Fuzzy Hash: 4B016230520704ABEF215B20DD4EF9677B8FF04706F041669F986E15E1EBE4A9988FB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EndPath.GDI32(?), ref: 00D013BF
                                                          • StrokeAndFillPath.GDI32(?,?,00D3BAD8,00000000,?), ref: 00D013DB
                                                          • SelectObject.GDI32(?,00000000), ref: 00D013EE
                                                          • DeleteObject.GDI32 ref: 00D01401
                                                          • StrokePath.GDI32(?), ref: 00D0141C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: 17856d908761c36a7ab23817a311a03b6ef36f1cabce3f8e261b34b6b2a4e0d8
                                                          • Instruction ID: ef6146bb849c9df2b361e71708a49a1ec18f598a7a92f1d3f5905402bfe77089
                                                          • Opcode Fuzzy Hash: 17856d908761c36a7ab23817a311a03b6ef36f1cabce3f8e261b34b6b2a4e0d8
                                                          • Instruction Fuzzy Hash: 7FF0B23401470AAFDB115FA6EC0CB583BA5AB01326F588224E569C92F1C735C9A5DF70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00D6C69D
                                                          • CoCreateInstance.OLE32(00D92D6C,00000000,00000001,00D92BDC,?), ref: 00D6C6B5
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                          • CoUninitialize.OLE32 ref: 00D6C922
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_memmove
                                                          • String ID: .lnk
                                                          • API String ID: 2683427295-24824748
                                                          • Opcode ID: 653e15ee283de42385bba171d9066baaaa5e8e8b61e09b4b9e257ef778798abb
                                                          • Instruction ID: 3d0dc9bf07f59fb603e6e1b7a4f0439d08a566252745f02c137d550e654b7ebb
                                                          • Opcode Fuzzy Hash: 653e15ee283de42385bba171d9066baaaa5e8e8b61e09b4b9e257ef778798abb
                                                          • Instruction Fuzzy Hash: B1A13C71204205AFD700EF54C891EABB7E8EF98304F00491DF59A9B1E2DB70EA49CB72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D20FF6: std::exception::exception.LIBCMT ref: 00D2102C
                                                            • Part of subcall function 00D20FF6: __CxxThrowException@8.LIBCMT ref: 00D21041
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                            • Part of subcall function 00D07BB1: _memmove.LIBCMT ref: 00D07C0B
                                                          • __swprintf.LIBCMT ref: 00D1302D
                                                          Strings
                                                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00D12EC6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                          • API String ID: 1943609520-557222456
                                                          • Opcode ID: 015028c4d2c7e00994eda51a273f331c47f8e27e954eddf5029810b0209cdd2e
                                                          • Instruction ID: b8bde32d7e0581f7228ed870d347faf62e86a10f2ba0bd7942077ecf5466a19f
                                                          • Opcode Fuzzy Hash: 015028c4d2c7e00994eda51a273f331c47f8e27e954eddf5029810b0209cdd2e
                                                          • Instruction Fuzzy Hash: 43916F71508301AFC718EF24E995D6EB7E4EF99740F04491DF4969B2A1DE20EE48CB72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D048AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D048A1,?,?,00D037C0,?), ref: 00D048CE
                                                          • CoInitialize.OLE32(00000000), ref: 00D6BC26
                                                          • CoCreateInstance.OLE32(00D92D6C,00000000,00000001,00D92BDC,?), ref: 00D6BC3F
                                                          • CoUninitialize.OLE32 ref: 00D6BC5C
                                                            • Part of subcall function 00D09997: __itow.LIBCMT ref: 00D099C2
                                                            • Part of subcall function 00D09997: __swprintf.LIBCMT ref: 00D09A0C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                          • String ID: .lnk
                                                          • API String ID: 2126378814-24824748
                                                          • Opcode ID: 95be38846b29f1c096f8589284315a44ad00547018f441f736ae48eab674b9b9
                                                          • Instruction ID: 25b40b10a88da9ce34fb44d26efe03a9a9f40e89a7fa0f0335964f3619e53db0
                                                          • Opcode Fuzzy Hash: 95be38846b29f1c096f8589284315a44ad00547018f441f736ae48eab674b9b9
                                                          • Instruction Fuzzy Hash: 11A106756043019FCB10DF24C494E6ABBE5FF89324F148959F89A9B3A2CB31ED45CBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 00D252DD
                                                            • Part of subcall function 00D30340: __87except.LIBCMT ref: 00D3037B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__87except__start
                                                          • String ID: pow
                                                          • API String ID: 2905807303-2276729525
                                                          • Opcode ID: 2255ebb1e4c889da5057b4cf87b04e1a2ad69de287d134039585f9119c455c36
                                                          • Instruction ID: c292037565648f3d619e1df51a0efe9df4111976b282808f9b46a20a1e9d5c37
                                                          • Opcode Fuzzy Hash: 2255ebb1e4c889da5057b4cf87b04e1a2ad69de287d134039585f9119c455c36
                                                          • Instruction Fuzzy Hash: 22516631A1D701D6CB10B724F921B6E2F94DF20354F288969E0D5822EEEE74CDD49AB6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #$+
                                                          • API String ID: 0-2552117581
                                                          • Opcode ID: 1fa3dbcabb0c050d4d77f5a8db5d893c8ad99de289e8a7a18a44cf9d7cc19d19
                                                          • Instruction ID: 4ec473ad92e2bf1f7ed822cb10a6c98e037ebd0db7bd973fcdc0cd910218bd74
                                                          • Opcode Fuzzy Hash: 1fa3dbcabb0c050d4d77f5a8db5d893c8ad99de289e8a7a18a44cf9d7cc19d19
                                                          • Instruction Fuzzy Hash: 3C514136504256CFCF16DF28E4986FA7BB4EF2A310F180056EC919B2A5D7749C4ACB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memset$_memmove
                                                          • String ID: ERCP
                                                          • API String ID: 2532777613-1384759551
                                                          • Opcode ID: f9ab5e8c24bb98cc82c4b562d1815cc3a6ba9e9547e5f94374530f9cbad2b8ce
                                                          • Instruction ID: 0e13b166d19a31346d7ba5c50b8d39f6ee9be6691309623981ebcaada77e2c36
                                                          • Opcode Fuzzy Hash: f9ab5e8c24bb98cc82c4b562d1815cc3a6ba9e9547e5f94374530f9cbad2b8ce
                                                          • Instruction Fuzzy Hash: BB51D171904719EBCB24CF65D881BEABBF4EF04314F24856EE99ACB241EB71D584CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00D8F910,00000000,?,?,?,?), ref: 00D87C4E
                                                          • GetWindowLongW.USER32 ref: 00D87C6B
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00D87C7B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: efc4e122d38c2764b453c35817ba4b9b565bacf86843dd491588c1cee9a96bf0
                                                          • Instruction ID: de6a0f82a8ae600296bbb40f067ef4c5193fdcb025d75510edca94a89229ae60
                                                          • Opcode Fuzzy Hash: efc4e122d38c2764b453c35817ba4b9b565bacf86843dd491588c1cee9a96bf0
                                                          • Instruction Fuzzy Hash: AE318D31204206AEDB11AF38DC45BEA77A9EB59324F244725F879D32E0D731E8559B70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00D876D0
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00D876E4
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00D87708
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: da0664f35380d2f5b7214b85f8105f0b9b53e1e91034ae407154b0d2b1117e8b
                                                          • Instruction ID: 44946747a36dba26ab23ff4c039a2dadd78fa403938941877a6fb78d7c41d871
                                                          • Opcode Fuzzy Hash: da0664f35380d2f5b7214b85f8105f0b9b53e1e91034ae407154b0d2b1117e8b
                                                          • Instruction Fuzzy Hash: A1219F32510219BBDF11DFA4CC46FEA3B69EF48724F250214FE15AB1D0DAB1E8549BB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00D86FAA
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00D86FBA
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00D86FDF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: 960587cad24abe0192cd6e32189fb8227ffcb425377b5c6b9a94f71166d60724
                                                          • Instruction ID: e485b362b0dd15ac888d96b274ba765b204f464cd10f001e662bd7e15a1888f7
                                                          • Opcode Fuzzy Hash: 960587cad24abe0192cd6e32189fb8227ffcb425377b5c6b9a94f71166d60724
                                                          • Instruction Fuzzy Hash: 48216232610218BFDF119F54DC85FAB37AAEF89764F158124FA159B190CA71EC51CBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00D879E1
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00D879F6
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00D87A03
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: 686f0291ad3a0a1bbf0d371a620b8aa4981551bc45ac704ff5b1fc02f281005b
                                                          • Instruction ID: b890d890c67266e70208bf3d3fcdb2b7cde8fb81d528ee0a83ad1f6a49f87a2d
                                                          • Opcode Fuzzy Hash: 686f0291ad3a0a1bbf0d371a620b8aa4981551bc45ac704ff5b1fc02f281005b
                                                          • Instruction Fuzzy Hash: A811E332254208BEEF14AF61CC45FEB3BADEF89764F150519FA45A60D0D672D811CB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00D04C2E), ref: 00D04CA3
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00D04CB5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetNativeSystemInfo$kernel32.dll
                                                          • API String ID: 2574300362-192647395
                                                          • Opcode ID: 874ea39d5e8edad3c67417c3e389c531fd475e0f632f90c404106c244770d7d2
                                                          • Instruction ID: 99fbf070ef7909ad1eb6db4d77439415a665e648b09ece6f48a11b7385cf2f28
                                                          • Opcode Fuzzy Hash: 874ea39d5e8edad3c67417c3e389c531fd475e0f632f90c404106c244770d7d2
                                                          • Instruction Fuzzy Hash: 6BD01271510723CFD7205F31D918B4676D5AF05751F1588399885D6290DA70D490C770
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00D04CE1,?), ref: 00D04DA2
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00D04DB4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-1355242751
                                                          • Opcode ID: 30386850a704bc82b7991ef1b13ab44570ce0f28b72b5729b89b740cc2adee67
                                                          • Instruction ID: bc27bbec5b7e35491efa1e4f64dde6ae4f9f1327ad059bbc9dbd23f3a2f7adb3
                                                          • Opcode Fuzzy Hash: 30386850a704bc82b7991ef1b13ab44570ce0f28b72b5729b89b740cc2adee67
                                                          • Instruction Fuzzy Hash: ADD01771660713CFD720AF31D808B8676E5AF05765B15883AD8CAD6290EB70D880CBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00D04D2E,?,00D04F4F,?,00DC62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00D04D6F
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00D04D81
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-3689287502
                                                          • Opcode ID: 0087effe8cfa59ed0819e3b43858e6d2ec5dbe6dfe4d38781b521c914bd47054
                                                          • Instruction ID: 55b860a25533f2d6070fd95d5783ad134cd611d0f5c97fbf280ef275f4d68e2d
                                                          • Opcode Fuzzy Hash: 0087effe8cfa59ed0819e3b43858e6d2ec5dbe6dfe4d38781b521c914bd47054
                                                          • Instruction Fuzzy Hash: A4D01771620713CFD720AF31D808B5676E8AF15762B19883ED48AD6290E670D880CB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00D812C1), ref: 00D81080
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00D81092
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2574300362-4033151799
                                                          • Opcode ID: 494588dc5f029cc50238dd995f33eab4aff5509410f89b346528a7d26a639f43
                                                          • Instruction ID: 62754aa8fd3f80253ad17d5b27d22df39219fd0b7b196908e7405f1680e903ed
                                                          • Opcode Fuzzy Hash: 494588dc5f029cc50238dd995f33eab4aff5509410f89b346528a7d26a639f43
                                                          • Instruction Fuzzy Hash: 24D01735520712CFD720AF35DC18A6A76E8AF05761B158C3AA48ADA250E7B0C8C4CB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00D79009,?,00D8F910), ref: 00D79403
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00D79415
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 2574300362-199464113
                                                          • Opcode ID: 603b72f93f483c27ee32a4764173013e7a745db72b49e5e228bed86cda76b8ac
                                                          • Instruction ID: 06d82962d1dcc1f8263d776370c6b8f76b6c9727edae09dea2bd72fac21eb3e5
                                                          • Opcode Fuzzy Hash: 603b72f93f483c27ee32a4764173013e7a745db72b49e5e228bed86cda76b8ac
                                                          • Instruction Fuzzy Hash: 09D0C736660313CFC7209F30C90C202B6E4AF00351B04C83AA48AC2650E670C880CB34
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d31bf68523dd4e017f853ef62d8d454e49653ccd2774d607249e87ea83965bc1
                                                          • Instruction ID: ae1c1a15ac77cbe240ee11742d8813f409a47ea63a9145ccbe54777faf961c30
                                                          • Opcode Fuzzy Hash: d31bf68523dd4e017f853ef62d8d454e49653ccd2774d607249e87ea83965bc1
                                                          • Instruction Fuzzy Hash: 0CC15C74A04216EFCB14CF98D884AAEBBB5FF48711B258598EC05EB251D730DE85CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 00D7E3D2
                                                          • CharLowerBuffW.USER32(?,?), ref: 00D7E415
                                                            • Part of subcall function 00D7DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00D7DAD9
                                                          • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00D7E615
                                                          • _memmove.LIBCMT ref: 00D7E628
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower$AllocVirtual_memmove
                                                          • String ID:
                                                          • API String ID: 3659485706-0
                                                          • Opcode ID: af500822f383fb1bc1ae946a43a7d611e05f62439d467be1e79b45d5b1df200a
                                                          • Instruction ID: 46289846006cfd0ff36c1de7dd09606e3f2db4ec80833a710b775c7dc18fcb7f
                                                          • Opcode Fuzzy Hash: af500822f383fb1bc1ae946a43a7d611e05f62439d467be1e79b45d5b1df200a
                                                          • Instruction Fuzzy Hash: 5FC14C716083119FC714DF28C480A5ABBE4FF89718F1889ADF8999B351E731E945CFA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00D783D8
                                                          • CoUninitialize.OLE32 ref: 00D783E3
                                                            • Part of subcall function 00D5DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00D5DAC5
                                                          • VariantInit.OLEAUT32(?), ref: 00D783EE
                                                          • VariantClear.OLEAUT32(?), ref: 00D786BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                          • String ID:
                                                          • API String ID: 780911581-0
                                                          • Opcode ID: a1c2db1b44496773e215adee2773f6397553760edafe84bc777a2a7998ac15e5
                                                          • Instruction ID: b31e4b4a973d9431a79f952396b7b7071e83375e10308fc939cbaa8650fdfc0b
                                                          • Opcode Fuzzy Hash: a1c2db1b44496773e215adee2773f6397553760edafe84bc777a2a7998ac15e5
                                                          • Instruction Fuzzy Hash: 90A13675244701AFCB10DF28C499B1AB7E5FF88314F188448F99A9B3A2DB70ED04DB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00D92C7C,?), ref: 00D57C32
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00D92C7C,?), ref: 00D57C4A
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,00D8FB80,000000FF,?,00000000,00000800,00000000,?,00D92C7C,?), ref: 00D57C6F
                                                          • _memcmp.LIBCMT ref: 00D57C90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: c96478115fdce90fa854a9fe6dfaafc63863817e588f473ea854b16e3fd7bbb7
                                                          • Instruction ID: 903443131c9900d513c4c6ca98c3f2a269f8054f6fb2f27822cc49f8a8902959
                                                          • Opcode Fuzzy Hash: c96478115fdce90fa854a9fe6dfaafc63863817e588f473ea854b16e3fd7bbb7
                                                          • Instruction Fuzzy Hash: A0810A71A00109EFCF04DF94D984EEEB7B9FF89315F244198E915AB250DB71AE0ACB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyInitString
                                                          • String ID:
                                                          • API String ID: 2808897238-0
                                                          • Opcode ID: c10e0b49119c99178b40b15897fc93fe9859663236bd2b76e9b9b34a067b7b28
                                                          • Instruction ID: 16eca0d19416fe9caf68003b0e033d31b061cfbd38ad7c4c675be8d3c5799f0a
                                                          • Opcode Fuzzy Hash: c10e0b49119c99178b40b15897fc93fe9859663236bd2b76e9b9b34a067b7b28
                                                          • Instruction Fuzzy Hash: 805199306047019ADF20AF69E895A6AF3F5EF48311F74881FED96C72D1DA70D8489B35
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D05045: _fseek.LIBCMT ref: 00D0505D
                                                            • Part of subcall function 00D699BE: _wcscmp.LIBCMT ref: 00D69AAE
                                                            • Part of subcall function 00D699BE: _wcscmp.LIBCMT ref: 00D69AC1
                                                          • _free.LIBCMT ref: 00D6992C
                                                          • _free.LIBCMT ref: 00D69933
                                                          • _free.LIBCMT ref: 00D6999E
                                                            • Part of subcall function 00D22F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00D29C64), ref: 00D22FA9
                                                            • Part of subcall function 00D22F95: GetLastError.KERNEL32(00000000,?,00D29C64), ref: 00D22FBB
                                                          • _free.LIBCMT ref: 00D699A6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                          • String ID:
                                                          • API String ID: 1552873950-0
                                                          • Opcode ID: d9ae0c5d453641694606f69828c3ed73b5fd5779769f00272cc49afe01aba135
                                                          • Instruction ID: fdb1b677d3d530412529e0752f646890b5ec8f967bc406859083aa4d9e012e05
                                                          • Opcode Fuzzy Hash: d9ae0c5d453641694606f69828c3ed73b5fd5779769f00272cc49afe01aba135
                                                          • Instruction Fuzzy Hash: F45150B1904218AFDF249F64DC41BAEBB79EF48310F1404AEB649A7281DB715E80CF78
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowRect.USER32(0170E9D0,?), ref: 00D89AD2
                                                          • ScreenToClient.USER32(00000002,00000002), ref: 00D89B05
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00D89B72
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: 6bc011bf42d051e10dc30dcf6e10662faa89c8fc177b89139b7e0b100e2324d1
                                                          • Instruction ID: 8438324cb4624dcb251f29b85a1bb8a44e79c32cd008c157a183de65afb19372
                                                          • Opcode Fuzzy Hash: 6bc011bf42d051e10dc30dcf6e10662faa89c8fc177b89139b7e0b100e2324d1
                                                          • Instruction Fuzzy Hash: A4510D74A00209AFCF14DF68D891ABEBBB5FF55320F188669F8559B290D730AD41CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00D76CE4
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00D76CF4
                                                            • Part of subcall function 00D09997: __itow.LIBCMT ref: 00D099C2
                                                            • Part of subcall function 00D09997: __swprintf.LIBCMT ref: 00D09A0C
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00D76D58
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00D76D64
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$__itow__swprintfsocket
                                                          • String ID:
                                                          • API String ID: 2214342067-0
                                                          • Opcode ID: 4902364b7edce61d8dcbf6d8a7298ea67c5ccff84e91ddfe89a84b599efacfb6
                                                          • Instruction ID: 1e90a18fb8ce8578ebd91d27730426ca7615ea59ef9b441dc2dd3c2def4263fb
                                                          • Opcode Fuzzy Hash: 4902364b7edce61d8dcbf6d8a7298ea67c5ccff84e91ddfe89a84b599efacfb6
                                                          • Instruction Fuzzy Hash: 31418274750600AFEB20AF24DC96F7A77A5DB44B10F448018FA5D9B2D3EAB19D018BB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00D8F910), ref: 00D767BA
                                                          • _strlen.LIBCMT ref: 00D767EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID:
                                                          • API String ID: 4218353326-0
                                                          • Opcode ID: 19acb52255196a2645de5a5a7a360753ffec1198f1d9a24e12ebcea8caabb7f3
                                                          • Instruction ID: aeb42bb59a9cf014b8ccb08798fccc802229adf818dd3250294e3a99a98897c0
                                                          • Opcode Fuzzy Hash: 19acb52255196a2645de5a5a7a360753ffec1198f1d9a24e12ebcea8caabb7f3
                                                          • Instruction Fuzzy Hash: D9419F31A00604ABCB14EB64DCD5FAEB7A9EF48314F148169F9199B2D2EB70ED44CB71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00D6BB09
                                                          • GetLastError.KERNEL32(?,00000000), ref: 00D6BB2F
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00D6BB54
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00D6BB80
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 140b48c82df12207a66ebf8fd79107eaad8a90b82cd18dbf952e26910426f2d4
                                                          • Instruction ID: 36ba45efe0e616f809700bee86810bdeb2c7c4d14c1e4e596f99c323e5a3a882
                                                          • Opcode Fuzzy Hash: 140b48c82df12207a66ebf8fd79107eaad8a90b82cd18dbf952e26910426f2d4
                                                          • Instruction Fuzzy Hash: A3412839600610DFCB10EF69C594A5DBBE1EF49320B098499E84A9B7A2CB74FD41CBB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00D88B4D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 0ec59573e510b4dda50e365e46647b7abfa61d75de10717911bf5b48d39bb73a
                                                          • Instruction ID: 2ac778af18e8b31319293a704e76bd0813e4a918661af2d797f096db8639b763
                                                          • Opcode Fuzzy Hash: 0ec59573e510b4dda50e365e46647b7abfa61d75de10717911bf5b48d39bb73a
                                                          • Instruction Fuzzy Hash: F63190B4640304BFEB24BB58CC85FA937A5EB85320FA84616FA55D62E0DE30F940A771
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 00D8AE1A
                                                          • GetWindowRect.USER32(?,?), ref: 00D8AE90
                                                          • PtInRect.USER32(?,?,00D8C304), ref: 00D8AEA0
                                                          • MessageBeep.USER32(00000000), ref: 00D8AF11
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: 68c5cf6ae33c23ddbaf176d2acc3da3a48b3ac3afd29974545a4bf4934308ee9
                                                          • Instruction ID: f40634233c174966af01869671e00fecc41b7dc8608259cf765878fa106e127c
                                                          • Opcode Fuzzy Hash: 68c5cf6ae33c23ddbaf176d2acc3da3a48b3ac3afd29974545a4bf4934308ee9
                                                          • Instruction Fuzzy Hash: 9741487060021A9FEB12EF5CC884A697BF5FF49350F1885AAF914DB351D730E801DB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00D61037
                                                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 00D61053
                                                          • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00D610B9
                                                          • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00D6110B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: c2c24d898816db48c2486844e183818a885a54cdfe68aaa909b4bb949db8f16d
                                                          • Instruction ID: 82a061af53ebf1af7e70c3a00519153d0f8edc00fc570ff14b0655b9f3b4e419
                                                          • Opcode Fuzzy Hash: c2c24d898816db48c2486844e183818a885a54cdfe68aaa909b4bb949db8f16d
                                                          • Instruction Fuzzy Hash: 04310334E40698AFFF308B66CC05BFABBA9EB49310F1C425AE591921D1C37589C59771
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00D61176
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00D61192
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00D611F1
                                                          • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00D61243
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 4e7be14419aa1f590c0e797fe4b0b3cee6a7924612407ad348e7e7d5618c6f42
                                                          • Instruction ID: 4e74d11b071f0c73a58aeccc9d278e46caa0fb9e145c7d71625cacaadf8368d6
                                                          • Opcode Fuzzy Hash: 4e7be14419aa1f590c0e797fe4b0b3cee6a7924612407ad348e7e7d5618c6f42
                                                          • Instruction Fuzzy Hash: E7312634A4071CAFEF308BA5CC15BFABBAAEB4A310F0C435AE680921D1C33889559775
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00D3644B
                                                          • __isleadbyte_l.LIBCMT ref: 00D36479
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00D364A7
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00D364DD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                          • String ID:
                                                          • API String ID: 3058430110-0
                                                          • Opcode ID: 6ad484fa60319dd55e0150d6a34d40a214db1faa112b958fe5ee9a706a11b4a4
                                                          • Instruction ID: 7e197d0bca3613a7c25237524497843f82595a4e884095edb97028eb266d6da7
                                                          • Opcode Fuzzy Hash: 6ad484fa60319dd55e0150d6a34d40a214db1faa112b958fe5ee9a706a11b4a4
                                                          • Instruction Fuzzy Hash: 0331C131A0825ABFDB218F75CC45BAA7BA5FF41310F198429E8958B291D731D850DBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 00D85189
                                                            • Part of subcall function 00D6387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00D63897
                                                            • Part of subcall function 00D6387D: GetCurrentThreadId.KERNEL32 ref: 00D6389E
                                                            • Part of subcall function 00D6387D: AttachThreadInput.USER32(00000000,?,00D652A7), ref: 00D638A5
                                                          • GetCaretPos.USER32(?), ref: 00D8519A
                                                          • ClientToScreen.USER32(00000000,?), ref: 00D851D5
                                                          • GetForegroundWindow.USER32 ref: 00D851DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: a40b5f419b16a8d10dc1d11b648d4b8915c90793c8b988e39583ea77723ae0bf
                                                          • Instruction ID: 7e2aa5c0b87649d55d1043d9738514dea95434757143882081cea711e6aebf46
                                                          • Opcode Fuzzy Hash: a40b5f419b16a8d10dc1d11b648d4b8915c90793c8b988e39583ea77723ae0bf
                                                          • Instruction Fuzzy Hash: D031EF71A00208AFDB00EFA5C855AEFF7F9EF98304F10406AE515E7252EA759E45CBB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D02612: GetWindowLongW.USER32(?,000000EB), ref: 00D02623
                                                          • GetCursorPos.USER32(?), ref: 00D8C7C2
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00D3BBFB,?,?,?,?,?), ref: 00D8C7D7
                                                          • GetCursorPos.USER32(?), ref: 00D8C824
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00D3BBFB,?,?,?), ref: 00D8C85E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: 860e0796ae185156fddf9d14091b65033d6374d0c113f3afba49a82fe97e3cc3
                                                          • Instruction ID: 9b2326e1bea14da8d38ec700b2454a35a48f9d41070a86e9eb7d9e316fc7e5e2
                                                          • Opcode Fuzzy Hash: 860e0796ae185156fddf9d14091b65033d6374d0c113f3afba49a82fe97e3cc3
                                                          • Instruction Fuzzy Hash: BE315A35610118EFCB25DF59C898EEA7BBAEF49710F4841A9F9058B2A1C7319D50DBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __setmode.LIBCMT ref: 00D20BF2
                                                            • Part of subcall function 00D05B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00D67B20,?,?,00000000), ref: 00D05B8C
                                                            • Part of subcall function 00D05B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00D67B20,?,?,00000000,?,?), ref: 00D05BB0
                                                          • _fprintf.LIBCMT ref: 00D20C29
                                                          • OutputDebugStringW.KERNEL32(?), ref: 00D56331
                                                            • Part of subcall function 00D24CDA: _flsall.LIBCMT ref: 00D24CF3
                                                          • __setmode.LIBCMT ref: 00D20C5E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                          • String ID:
                                                          • API String ID: 521402451-0
                                                          • Opcode ID: 673518ef010bfc891c8c529c097fd9c0cb3e036d2c0e326ba55c6ccccc5f9923
                                                          • Instruction ID: 338147a0b8d94b63e62129b6785b6e81d53a2e99ade4412d53fdb9d259fdd3fc
                                                          • Opcode Fuzzy Hash: 673518ef010bfc891c8c529c097fd9c0cb3e036d2c0e326ba55c6ccccc5f9923
                                                          • Instruction Fuzzy Hash: A21166729042187BDB04B7B4BC43ABEBB68DF55324F18011AF908971C2DE609D859BB5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D58652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00D58669
                                                            • Part of subcall function 00D58652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00D58673
                                                            • Part of subcall function 00D58652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D58682
                                                            • Part of subcall function 00D58652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00D58689
                                                            • Part of subcall function 00D58652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D5869F
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00D58BEB
                                                          • _memcmp.LIBCMT ref: 00D58C0E
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D58C44
                                                          • HeapFree.KERNEL32(00000000), ref: 00D58C4B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: 597cef5dd446721ed234d843ae2cbdf5191ce9d35c80eabc0201b7f810f09ba4
                                                          • Instruction ID: 325ad3b702565bdbac88aec511a27b7ac73b88a5d2a3cf25804395964fb79925
                                                          • Opcode Fuzzy Hash: 597cef5dd446721ed234d843ae2cbdf5191ce9d35c80eabc0201b7f810f09ba4
                                                          • Instruction Fuzzy Hash: 9A215A71E01208ABDF10DFA4C949BBEB7B8EF54356F184059EC54A7240DB31AA0ADB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00D71A97
                                                            • Part of subcall function 00D71B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00D71B40
                                                            • Part of subcall function 00D71B21: InternetCloseHandle.WININET(00000000), ref: 00D71BDD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Internet$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 1463438336-0
                                                          • Opcode ID: a80e256b770aeae9d25d8734cca0cacd06dadb2a8cced286024ec20bff6311bc
                                                          • Instruction ID: 7c578dcaac73dede912e7c318a64aad71eac0c5f84f9d68900e13a0dda90e3f1
                                                          • Opcode Fuzzy Hash: a80e256b770aeae9d25d8734cca0cacd06dadb2a8cced286024ec20bff6311bc
                                                          • Instruction Fuzzy Hash: 5E219F39200601BFEB159F648C01FBAB7A9FF45701F14821AFA5996650FB71D811ABB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D5F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00D5E1C4,?,?,?,00D5EFB7,00000000,000000EF,00000119,?,?), ref: 00D5F5BC
                                                            • Part of subcall function 00D5F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00D5F5E2
                                                            • Part of subcall function 00D5F5AD: lstrcmpiW.KERNEL32(00000000,?,00D5E1C4,?,?,?,00D5EFB7,00000000,000000EF,00000119,?,?), ref: 00D5F613
                                                          • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00D5EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00D5E1DD
                                                          • lstrcpyW.KERNEL32(00000000,?), ref: 00D5E203
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00D5EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00D5E237
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: 7813f501782ca63e70aaa7afafed642c9100a675e4bd21f2ae44c455f427c9a1
                                                          • Instruction ID: 29b5e293ef1a6ea7aa8b868e971f0a04353df0752fd829704fb973c7f9e7c933
                                                          • Opcode Fuzzy Hash: 7813f501782ca63e70aaa7afafed642c9100a675e4bd21f2ae44c455f427c9a1
                                                          • Instruction Fuzzy Hash: E411BE3A200345EFCF29AF64D84997A77A8FF85311B44802AEC06CB2A4EB71995487B4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 00D35351
                                                            • Part of subcall function 00D2594C: __FF_MSGBANNER.LIBCMT ref: 00D25963
                                                            • Part of subcall function 00D2594C: __NMSG_WRITE.LIBCMT ref: 00D2596A
                                                            • Part of subcall function 00D2594C: RtlAllocateHeap.NTDLL(016F0000,00000000,00000001,00000000,?,?,?,00D21013,?), ref: 00D2598F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 668f2284ebc085a9ee87e6e515d8aba9912cd879a3ee4b9e0d674103d4e669cb
                                                          • Instruction ID: 1415fa189105c0c9e7865667d9f8e9fb68a4fc1759ba617b1b0dd70392432819
                                                          • Opcode Fuzzy Hash: 668f2284ebc085a9ee87e6e515d8aba9912cd879a3ee4b9e0d674103d4e669cb
                                                          • Instruction Fuzzy Hash: 0D11C632505B26AFCB213F70FC45A5D3798DF203E4F14042AF945DA195DE75C94197B0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D04560
                                                            • Part of subcall function 00D0410D: _memset.LIBCMT ref: 00D0418D
                                                            • Part of subcall function 00D0410D: _wcscpy.LIBCMT ref: 00D041E1
                                                            • Part of subcall function 00D0410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00D041F1
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 00D045B5
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00D045C4
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00D3D6CE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                          • String ID:
                                                          • API String ID: 1378193009-0
                                                          • Opcode ID: bb4484f5e978cef8edd0ad716ee73a7b0269eda6c754dde86e2ebaa68759aec4
                                                          • Instruction ID: 1c2af212d85747d143f62d2af840e11f2e051b7fa7f810bc9eb04b3d1753572f
                                                          • Opcode Fuzzy Hash: bb4484f5e978cef8edd0ad716ee73a7b0269eda6c754dde86e2ebaa68759aec4
                                                          • Instruction Fuzzy Hash: EF21DAB09047889FE7328B24DC49FE7BBED9F01304F04009DE69D96281C7745A848F71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D05B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00D67B20,?,?,00000000), ref: 00D05B8C
                                                            • Part of subcall function 00D05B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00D67B20,?,?,00000000,?,?), ref: 00D05BB0
                                                          • gethostbyname.WSOCK32(?), ref: 00D766AC
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00D766B7
                                                          • _memmove.LIBCMT ref: 00D766E4
                                                          • inet_ntoa.WSOCK32(?), ref: 00D766EF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                          • String ID:
                                                          • API String ID: 1504782959-0
                                                          • Opcode ID: e6a2fb07481810acba8c5a02a24b64189d32c89eb626ae0a14a7b37af0edbc6e
                                                          • Instruction ID: e8f5abaf68aa5f4a79ec7dfd2a507cddeae593b6236a108e1d2c390c9ea005c9
                                                          • Opcode Fuzzy Hash: e6a2fb07481810acba8c5a02a24b64189d32c89eb626ae0a14a7b37af0edbc6e
                                                          • Instruction Fuzzy Hash: 91114275500505AFCB04EBA4D996EAEB7B8EF54310B144065F90AA72A2EB30AE14DB71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00D59043
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D59055
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D5906B
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D59086
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 62e99978479f979d595c15b302aa1faa57147b5f22a9a4fddfc55e6ee16b03e8
                                                          • Instruction ID: 327a29716836565e415082b521cd42e3e522eaeba977dcbace09fd269ef94198
                                                          • Opcode Fuzzy Hash: 62e99978479f979d595c15b302aa1faa57147b5f22a9a4fddfc55e6ee16b03e8
                                                          • Instruction Fuzzy Hash: 59114C79900218FFDF10DFA9C885E9DFB74FB48310F204095E904B7290D6716E50DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D02612: GetWindowLongW.USER32(?,000000EB), ref: 00D02623
                                                          • DefDlgProcW.USER32(?,00000020,?), ref: 00D012D8
                                                          • GetClientRect.USER32(?,?), ref: 00D3B84B
                                                          • GetCursorPos.USER32(?), ref: 00D3B855
                                                          • ScreenToClient.USER32(?,?), ref: 00D3B860
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: f93d1139614850d1b04f30f00b4fa7cd6f5455028099717a5c2610fa4c058fd4
                                                          • Instruction ID: 42816b84bab684e9942227626352b00fe597d222e76f923e15d30e4c9255ae59
                                                          • Opcode Fuzzy Hash: f93d1139614850d1b04f30f00b4fa7cd6f5455028099717a5c2610fa4c058fd4
                                                          • Instruction Fuzzy Hash: 04113A39910119EFCB00EFA8D88AAFE77B8FB05300F400456F945E7290D730BA519BB9
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00D601FD,?,00D61250,?,00008000), ref: 00D6166F
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00D601FD,?,00D61250,?,00008000), ref: 00D61694
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00D601FD,?,00D61250,?,00008000), ref: 00D6169E
                                                          • Sleep.KERNEL32(?,?,?,?,?,?,?,00D601FD,?,00D61250,?,00008000), ref: 00D616D1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: 74f8890189b474a8c772b18b8917dc226348ab528bb582b8a98eba7165180faf
                                                          • Instruction ID: 775c1421abac386f092196aac8428cd38817f83b20bdfcab851c75f57f997882
                                                          • Opcode Fuzzy Hash: 74f8890189b474a8c772b18b8917dc226348ab528bb582b8a98eba7165180faf
                                                          • Instruction Fuzzy Hash: F9112739C1062DEBCF009FE5D948AEEBB78FF19751F09445AE980F6240CB7095648BB6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                          • String ID:
                                                          • API String ID: 3016257755-0
                                                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction ID: 19b7eee001fb3e9d9ea645733d432c9a930f7df4a8eeb44f98ee38baf4b08088
                                                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction Fuzzy Hash: 39014EBA04458EBBCF225E84CC018EE3F62BF59355F588615FE1858031D236C9B1BBA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00D8B59E
                                                          • ScreenToClient.USER32(?,?), ref: 00D8B5B6
                                                          • ScreenToClient.USER32(?,?), ref: 00D8B5DA
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D8B5F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: 2108fa51d500029845b12ad34ca1ab2a2e729d09a9d21cf7f5e6ec0c32bc1d0a
                                                          • Instruction ID: a611956d0828f1bc614eabc89e723d72b2d6ed408daf47a943e1e70d1f01d008
                                                          • Opcode Fuzzy Hash: 2108fa51d500029845b12ad34ca1ab2a2e729d09a9d21cf7f5e6ec0c32bc1d0a
                                                          • Instruction Fuzzy Hash: E61134B5D00209EFDB41DF99C4459EEBBB5FB08310F104166E954E2720D735AA558F60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D8B8FE
                                                          • _memset.LIBCMT ref: 00D8B90D
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00DC7F20,00DC7F64), ref: 00D8B93C
                                                          • CloseHandle.KERNEL32 ref: 00D8B94E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseCreateHandleProcess
                                                          • String ID:
                                                          • API String ID: 3277943733-0
                                                          • Opcode ID: dbe86b79af3224b036b46935f99a1e1c24a2129c17d3fa40c41890b0ba81a87b
                                                          • Instruction ID: 81016ebad9203801c77367838163ae756e11906ca207d6ee2405e4d46cb844ff
                                                          • Opcode Fuzzy Hash: dbe86b79af3224b036b46935f99a1e1c24a2129c17d3fa40c41890b0ba81a87b
                                                          • Instruction Fuzzy Hash: C2F082B26443127BF2102B61AC85FBB3A5CEF09358F000029FB08D6392D7755D008BB8
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00D66E88
                                                            • Part of subcall function 00D6794E: _memset.LIBCMT ref: 00D67983
                                                          • _memmove.LIBCMT ref: 00D66EAB
                                                          • _memset.LIBCMT ref: 00D66EB8
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00D66EC8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection_memset$EnterLeave_memmove
                                                          • String ID:
                                                          • API String ID: 48991266-0
                                                          • Opcode ID: 02b358b8f9528b2bf00cdc0cd793874b7a82bd655516d81ec7241b6a7e3c6d92
                                                          • Instruction ID: 363aaf258ac246b2870eee5b89e7eae3064ec286b51c0db8386533f9f830aeed
                                                          • Opcode Fuzzy Hash: 02b358b8f9528b2bf00cdc0cd793874b7a82bd655516d81ec7241b6a7e3c6d92
                                                          • Instruction Fuzzy Hash: F3F0543A200214ABCF016F55EC85F49BB29EF55324B04C061FE089E21AC735A911DBB4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D012F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00D0134D
                                                            • Part of subcall function 00D012F3: SelectObject.GDI32(?,00000000), ref: 00D0135C
                                                            • Part of subcall function 00D012F3: BeginPath.GDI32(?), ref: 00D01373
                                                            • Part of subcall function 00D012F3: SelectObject.GDI32(?,00000000), ref: 00D0139C
                                                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00D8C030
                                                          • LineTo.GDI32(00000000,?,?), ref: 00D8C03D
                                                          • EndPath.GDI32(00000000), ref: 00D8C04D
                                                          • StrokePath.GDI32(00000000), ref: 00D8C05B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: 580cd9477c41963608e351b35d26a9f38b732baae74c5d5b334db9405def187a
                                                          • Instruction ID: 31f6a65072cc93269026cff76480038a250b2a41bac9ffe1268b7fc4853fed62
                                                          • Opcode Fuzzy Hash: 580cd9477c41963608e351b35d26a9f38b732baae74c5d5b334db9405def187a
                                                          • Instruction Fuzzy Hash: EDF0BE3101031AFBDB126F90AC0AFCE3F59AF05310F144000FA11A12E287758560DBB5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00D5A399
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00D5A3AC
                                                          • GetCurrentThreadId.KERNEL32 ref: 00D5A3B3
                                                          • AttachThreadInput.USER32(00000000), ref: 00D5A3BA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 3ba213ff47edd64e6ccdf0f8d29591439836396f99e721a476b0acd418426ae6
                                                          • Instruction ID: 11ef889e213841f00afd862b1549059c71fdba547ae4bb07adbf9685e2d63a93
                                                          • Opcode Fuzzy Hash: 3ba213ff47edd64e6ccdf0f8d29591439836396f99e721a476b0acd418426ae6
                                                          • Instruction Fuzzy Hash: D0E03931141338BAEB202BA2DC0DED73F1CEF167A2F048224F908C4060D675C554CBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 00D02231
                                                          • SetTextColor.GDI32(?,000000FF), ref: 00D0223B
                                                          • SetBkMode.GDI32(?,00000001), ref: 00D02250
                                                          • GetStockObject.GDI32(00000005), ref: 00D02258
                                                          • GetWindowDC.USER32(?,00000000), ref: 00D3C0D3
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00D3C0E0
                                                          • GetPixel.GDI32(00000000,?,00000000), ref: 00D3C0F9
                                                          • GetPixel.GDI32(00000000,00000000,?), ref: 00D3C112
                                                          • GetPixel.GDI32(00000000,?,?), ref: 00D3C132
                                                          • ReleaseDC.USER32(?,00000000), ref: 00D3C13D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                          • String ID:
                                                          • API String ID: 1946975507-0
                                                          • Opcode ID: 8b15fbf20403c02aea7d5c3e9218f4b91e92330d1750e4f9d04e2623a1126f41
                                                          • Instruction ID: 0d77ef5e0a2e5fb497786e019801048abced2e939429b670e90685a8f54f2a0f
                                                          • Opcode Fuzzy Hash: 8b15fbf20403c02aea7d5c3e9218f4b91e92330d1750e4f9d04e2623a1126f41
                                                          • Instruction Fuzzy Hash: 3BE06D32110344EADB215FB4FC0D7D83B14EB05732F148366FA69981E187724990DB31
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 00D58C63
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,00D5882E), ref: 00D58C6A
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00D5882E), ref: 00D58C77
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,00D5882E), ref: 00D58C7E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: 20135ed488ccf36990c4637fa3e2c4d70c0907992a69cb2ebbc03cfa44b6fa0e
                                                          • Instruction ID: ef6d00ec8f7392e5b2d739529053d9b78fe74f8d464d085a9716d00d1eacb1c0
                                                          • Opcode Fuzzy Hash: 20135ed488ccf36990c4637fa3e2c4d70c0907992a69cb2ebbc03cfa44b6fa0e
                                                          • Instruction Fuzzy Hash: 5AE04F366523119BDB205FB06D0CB563BA8AF54B92F184828AA45D9140DA3484459B71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 00D42187
                                                          • GetDC.USER32(00000000), ref: 00D42191
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00D421B1
                                                          • ReleaseDC.USER32(?), ref: 00D421D2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 9d7a6031842d029c5380e14bd002dbd3e1e681f49020fdd4e37e304cf45d4131
                                                          • Instruction ID: 6c5cd9b6adfbcc2fa8461939d019f4b2bb8b4a36160a49ad7368ab7e22301273
                                                          • Opcode Fuzzy Hash: 9d7a6031842d029c5380e14bd002dbd3e1e681f49020fdd4e37e304cf45d4131
                                                          • Instruction Fuzzy Hash: 02E0E575910304EFDB019F60C809BAD7BB5EF5C350F108525F95AD7360DB7881519F60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 00D4219B
                                                          • GetDC.USER32(00000000), ref: 00D421A5
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00D421B1
                                                          • ReleaseDC.USER32(?), ref: 00D421D2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 2300151f952cba1c78f53d3c7b39e092a8710fc1f49d7a17d1b8fe80935751ca
                                                          • Instruction ID: 0a097ff2077232b7aa0a05e172bdda60489111140bcc27227dd255706ed65748
                                                          • Opcode Fuzzy Hash: 2300151f952cba1c78f53d3c7b39e092a8710fc1f49d7a17d1b8fe80935751ca
                                                          • Instruction Fuzzy Hash: FBE0EEB5920304AFCB01AFA0C809B9DBBA5EF5C310F108229F95AE7360EB7891519F60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • OleSetContainedObject.OLE32(?,00000001), ref: 00D5B981
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ContainedObject
                                                          • String ID: AutoIt3GUI$Container
                                                          • API String ID: 3565006973-3941886329
                                                          • Opcode ID: 7d127482b8a9e468ace08bbf6087fca4433a6c122bd0315fda24cdbc633b2f69
                                                          • Instruction ID: 406c895b63e443ebd45b97f61590b90cd7d5f342654d3a419d0c557d7aa3a1da
                                                          • Opcode Fuzzy Hash: 7d127482b8a9e468ace08bbf6087fca4433a6c122bd0315fda24cdbc633b2f69
                                                          • Instruction Fuzzy Hash: 25914974600601AFDB24CF24C895A6ABBE8FF48721F14856EED4ACB691DB70E844CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D1FEC6: _wcscpy.LIBCMT ref: 00D1FEE9
                                                            • Part of subcall function 00D09997: __itow.LIBCMT ref: 00D099C2
                                                            • Part of subcall function 00D09997: __swprintf.LIBCMT ref: 00D09A0C
                                                          • __wcsnicmp.LIBCMT ref: 00D6B298
                                                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00D6B361
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                          • String ID: LPT
                                                          • API String ID: 3222508074-1350329615
                                                          • Opcode ID: cc94e51de779c5ac5228209980baf1be0deae4f8a8f1c8a967467b0c9982ee7f
                                                          • Instruction ID: d971a7d421dcd7f4068670ac9493cf79a7d6cbf31cf8c657f61ca2005f9594f6
                                                          • Opcode Fuzzy Hash: cc94e51de779c5ac5228209980baf1be0deae4f8a8f1c8a967467b0c9982ee7f
                                                          • Instruction Fuzzy Hash: E7615075A00215AFCB14DF98D895EAEB7B4EF08320F15405AF946EB391DB70AE84CB74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 00D12AC8
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00D12AE1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: 87f71b8bf2f64b6d2ee01a780fc5a787b854ac4a8b7d4060724b9c5c08771de9
                                                          • Instruction ID: de6c05c5f214a7f97f8c6c6c4520f1790b161797aaf953b20628f5f4cff7098f
                                                          • Opcode Fuzzy Hash: 87f71b8bf2f64b6d2ee01a780fc5a787b854ac4a8b7d4060724b9c5c08771de9
                                                          • Instruction Fuzzy Hash: AD5147715187449BD320AF14DC96BAFBBE8FF84310F42885DF2D9811A6DB708529CB36
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D0506B: __fread_nolock.LIBCMT ref: 00D05089
                                                          • _wcscmp.LIBCMT ref: 00D69AAE
                                                          • _wcscmp.LIBCMT ref: 00D69AC1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$__fread_nolock
                                                          • String ID: FILE
                                                          • API String ID: 4029003684-3121273764
                                                          • Opcode ID: 98047176339b8e0ea137bd3bec2c5761cf6ca13253af87b699b84381a039c0b7
                                                          • Instruction ID: 81458494c16f4454b13936e64fb0ce97bddd04cc82cb5eb7972cecb7d4cca479
                                                          • Opcode Fuzzy Hash: 98047176339b8e0ea137bd3bec2c5761cf6ca13253af87b699b84381a039c0b7
                                                          • Instruction Fuzzy Hash: C441C471A00619BBDF209AA4DC86FEFBBBDDF45714F00006AF904E71C5DA75AA048BB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D72892
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00D728C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_memset
                                                          • String ID: |
                                                          • API String ID: 1413715105-2343686810
                                                          • Opcode ID: d7309cace5264556addd7f79f92b8226ee1c6d6c6f0484b2a201512fd0fc00ec
                                                          • Instruction ID: f76d158e3da12bddd4693729727727496e2abd5b889232fdc4a46a060e142521
                                                          • Opcode Fuzzy Hash: d7309cace5264556addd7f79f92b8226ee1c6d6c6f0484b2a201512fd0fc00ec
                                                          • Instruction Fuzzy Hash: 47311971D00119ABDF019FA1DC85EEEBFB9FF08300F144029F919A6265EB315A56DB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00D86D86
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00D86DC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: c465416283203c14e6c2c4aa869103c654e6b9ea4fb3641992695d8d70f1319d
                                                          • Instruction ID: 0c34fc8a882c6eceef31d4dd10a84eb6a90dd284ebed10f64dc9726761a11f04
                                                          • Opcode Fuzzy Hash: c465416283203c14e6c2c4aa869103c654e6b9ea4fb3641992695d8d70f1319d
                                                          • Instruction Fuzzy Hash: 71316D71210604AEDB10AF68DC80BFB77A9FF48720F149619F9A9D7190DA31EC91CB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D62E00
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00D62E3B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: d2fd04fa318c20474306b8613bb6540fa0128ad77fa7655bd2c7ac70113b319a
                                                          • Instruction ID: b9f71594f7547bc80b091f194ca9e0e191bcea3738c2e5433bdb2deb780bce73
                                                          • Opcode Fuzzy Hash: d2fd04fa318c20474306b8613bb6540fa0128ad77fa7655bd2c7ac70113b319a
                                                          • Instruction Fuzzy Hash: 2031F531A00709ABEB248F48D945BFEBBB9EF05300F184439F985D61A2D7719944CB70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00D869D0
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00D869DB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: fd81ad7e30b565ccbfe786e3a2ba0541b50a1df3b7e60273b65a799404c95dd0
                                                          • Instruction ID: 90f1bdd704a8c6555edfb7806588290b28e6a61df63318119e2b051b7e9d4897
                                                          • Opcode Fuzzy Hash: fd81ad7e30b565ccbfe786e3a2ba0541b50a1df3b7e60273b65a799404c95dd0
                                                          • Instruction Fuzzy Hash: E811BF71600209AFEF11BF24CC80EEB376AEB883B4F254225F9589B2D0D671DC518BB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D01D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00D01D73
                                                            • Part of subcall function 00D01D35: GetStockObject.GDI32(00000011), ref: 00D01D87
                                                            • Part of subcall function 00D01D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00D01D91
                                                          • GetWindowRect.USER32(00000000,?), ref: 00D86EE0
                                                          • GetSysColor.USER32(00000012), ref: 00D86EFA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 467fabc653be17968edfa285e8df871246c903e55bcbcd29aa92bf1103c64575
                                                          • Instruction ID: 558d2ff813ec1607ccb5ae6b831fa0ea1a7a0cf274132f8cbe5084fb1ab3f976
                                                          • Opcode Fuzzy Hash: 467fabc653be17968edfa285e8df871246c903e55bcbcd29aa92bf1103c64575
                                                          • Instruction Fuzzy Hash: 4921267662020AAFDB05EFA8DD45EFA7BB8FB08314F044629F955D3250E634E8619B60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 00D86C11
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00D86C20
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 9e5803325769280692b32b08529c652147b564c14e0403fb61d109150d81c63b
                                                          • Instruction ID: fd723007d4f0c708dfe04f14acec532e5ba0ce563c62308e63252fc508e844f5
                                                          • Opcode Fuzzy Hash: 9e5803325769280692b32b08529c652147b564c14e0403fb61d109150d81c63b
                                                          • Instruction Fuzzy Hash: 2C116A71511208ABEB10AF64DC41AEB3B69EB04378F644724F9A5D71E0C675EC919B70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00D62F11
                                                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00D62F30
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 55180242ea6cebf1f715083d388b86d46b5fb52a9d31f95b182210d6348f8fd5
                                                          • Instruction ID: 0ef06f7451704e8a07ed8f1e91b83fa0259213337ee1c676863017a75c96289f
                                                          • Opcode Fuzzy Hash: 55180242ea6cebf1f715083d388b86d46b5fb52a9d31f95b182210d6348f8fd5
                                                          • Instruction Fuzzy Hash: D4117931901625ABDB20DA99DC44BB977B9EF05310F1800B5F894E72A2D7B2EE0487B1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00D72520
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00D72549
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: 34ae06653d994af89f609ca700898886f490947a59740080c4aeae53d7616fc9
                                                          • Instruction ID: 0fbfdf62ba9a166b67bb2c5e3dcbc51f640163c440603c94de16f8d076546b13
                                                          • Opcode Fuzzy Hash: 34ae06653d994af89f609ca700898886f490947a59740080c4aeae53d7616fc9
                                                          • Instruction Fuzzy Hash: 96110670500265BEDB248F518C95EFBFF68FF15355F10C12AF54942140F2709940D6F0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D7830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00D780C8,?,00000000,?,?), ref: 00D78322
                                                          • inet_addr.WSOCK32(00000000), ref: 00D780CB
                                                          • htons.WSOCK32(00000000), ref: 00D78108
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWidehtonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 2496851823-2422070025
                                                          • Opcode ID: b816747f3632c3c744d4e530f7da9d8bbd2ce4355fb687afe7efecf0b0ee6b75
                                                          • Instruction ID: c9501d06bafb8fc09a1f89a2ea3220db8002ae57d3dd27c7f851116b5d286993
                                                          • Opcode Fuzzy Hash: b816747f3632c3c744d4e530f7da9d8bbd2ce4355fb687afe7efecf0b0ee6b75
                                                          • Instruction Fuzzy Hash: ED11A534640305ABDB10AF64DC4AFAEB364FF04710F108516FD15972D1EA71A815D775
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                            • Part of subcall function 00D5B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00D5B0E7
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00D59355
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 0944b98458c59d45bcc9fe18fa4aac228627f00772689f578aa0f7805f841552
                                                          • Instruction ID: 89488f7e4123782c631244dde77a2512754456d497997ef80df213a30a86a221
                                                          • Opcode Fuzzy Hash: 0944b98458c59d45bcc9fe18fa4aac228627f00772689f578aa0f7805f841552
                                                          • Instruction Fuzzy Hash: 93019E71A45219EBDF04EBA4CCA29FEB7A9FF06320B140619BD76572D1DA31690C8770
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                            • Part of subcall function 00D5B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00D5B0E7
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00D5924D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 48b1fd68398f33a612a5a114849c6c6b0fcd4f4de70ff769f553103c3da54126
                                                          • Instruction ID: af1f6a258ab01b3f4a3ee5845a95f8b6cc7bd878729be096e8a4787650495a8d
                                                          • Opcode Fuzzy Hash: 48b1fd68398f33a612a5a114849c6c6b0fcd4f4de70ff769f553103c3da54126
                                                          • Instruction Fuzzy Hash: A4018471B41209BBCF14EBA0C9A2EFFB7A8DF05311F540119BD16672C1EA256E0C9671
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D07F41: _memmove.LIBCMT ref: 00D07F82
                                                            • Part of subcall function 00D5B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00D5B0E7
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00D592D0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 285b1517475d2e4dc3e186eb451a24d3ac6e67c31627d224b533d87de508204f
                                                          • Instruction ID: 09109b7675433f607b90fcbc81f637492ec1c61c5bbe75e681f06173dde4f946
                                                          • Opcode Fuzzy Hash: 285b1517475d2e4dc3e186eb451a24d3ac6e67c31627d224b533d87de508204f
                                                          • Instruction Fuzzy Hash: F701F271A81208BBCF00EBA4C892EFFB7ACDF05301F640119BD06632C2DA21AE0C8675
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp
                                                          • String ID: #32770
                                                          • API String ID: 2292705959-463685578
                                                          • Opcode ID: 660e48e66995f676875ccd8a31ce240c1bf5889571a6cf63b347ca769734a96d
                                                          • Instruction ID: 43df468e0a08d960d257b8f473ee7b2d48e7cd52c50abb0c5b54a034873cc0d5
                                                          • Opcode Fuzzy Hash: 660e48e66995f676875ccd8a31ce240c1bf5889571a6cf63b347ca769734a96d
                                                          • Instruction Fuzzy Hash: 64E06832A0032D2BE7209B99AC0AFA7F7ACEB54731F00016BFD10D3140E5609A448BF0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00D581CA
                                                            • Part of subcall function 00D23598: _doexit.LIBCMT ref: 00D235A2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: Message_doexit
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 1993061046-4017498283
                                                          • Opcode ID: 45f62489d61c77fe89f72de1c4961628630dae6801b31ac8d3308bb3fa95abbc
                                                          • Instruction ID: 043037977203573c54a594f3fd850f237797be2915e3348e3889cbe1064de01c
                                                          • Opcode Fuzzy Hash: 45f62489d61c77fe89f72de1c4961628630dae6801b31ac8d3308bb3fa95abbc
                                                          • Instruction Fuzzy Hash: 34D0C23628436836D21032A46D07FC566488B14B16F004021BB08A51C389D5448142F8
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00D3B564: _memset.LIBCMT ref: 00D3B571
                                                            • Part of subcall function 00D20B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00D3B540,?,?,?,00D0100A), ref: 00D20B89
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,00D0100A), ref: 00D3B544
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00D0100A), ref: 00D3B553
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00D3B54E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 3158253471-631824599
                                                          • Opcode ID: 8335728106e22d5f7f9c2b6ba8b390fa920714334faaa931b4aad156f171d5f9
                                                          • Instruction ID: 02da9e2bc0f782ad1fa5c54b9a223d3b9b45f60d4a6d2ec00f0a958e1fbf9d09
                                                          • Opcode Fuzzy Hash: 8335728106e22d5f7f9c2b6ba8b390fa920714334faaa931b4aad156f171d5f9
                                                          • Instruction Fuzzy Hash: 4BE065B02003118FD720DF69E804742BBE0AB10728F04892EE986C23A1EBB4E548CBB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00D85BF5
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00D85C08
                                                            • Part of subcall function 00D654E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00D6555E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1689309103.0000000000D01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
                                                          • Associated: 00000000.00000002.1689295784.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000D8F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689349855.0000000000DB5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689385433.0000000000DBF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1689399563.0000000000DC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d00000_tems.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 264a094da732a4a7a4992cc3ec1b357aa9e41eb3d6c2c3822daed1b0cd04166f
                                                          • Instruction ID: 77a520d4e3c57828c3fd1bb4eafcb4e5d228ff657a1e51136ef7d6c05a45aa42
                                                          • Opcode Fuzzy Hash: 264a094da732a4a7a4992cc3ec1b357aa9e41eb3d6c2c3822daed1b0cd04166f
                                                          • Instruction Fuzzy Hash: CBD0C931398311BBE764AB74AC0BFE76A14AB00B51F000865B746EA2D0D9E46841C770
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%