Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PDT_7367027738832_789257820__________________________.exe

Overview

General Information

Sample name:PDT_7367027738832_789257820__________________________.exe
Analysis ID:1430156
MD5:656aeda4f4a3ad9555f6d88c74fc0705
SHA1:3da5e7c273689cb837de918b39c2650484cd342e
SHA256:a3f5e3e9e01fdd51293410aa65759c2ea0ba6fd96860b6b9e9e0cea139f4d939
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Yara detected AgentTesla
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PDT_7367027738832_789257820__________________________.exe (PID: 7440 cmdline: "C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe" MD5: 656AEDA4F4A3AD9555F6D88C74FC0705)
    • RegSvcs.exe (PID: 7456 cmdline: "C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.worlorderbillions.top", "Username": "obinosky411@worlorderbillions.top", "Password": "##z$P{dTygVX                  "}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.2931527386.000000000292A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
          • 0x33507:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
          • 0x33579:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
          • 0x33603:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
          • 0x33695:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
          • 0x336ff:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
          • 0x33771:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
          • 0x33807:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
          • 0x33897:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
          Click to see the 8 entries
          SourceRuleDescriptionAuthorStrings
          0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x31707:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x31779:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x31803:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x31895:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x318ff:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x31971:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x31a07:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x31a97:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 4 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe", CommandLine: "C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe, NewProcessName: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe, OriginalFileName: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe", ProcessId: 7440, ProcessName: PDT_7367027738832_789257820__________________________.exe
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.244.151.84, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7456, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 1.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.worlorderbillions.top", "Username": "obinosky411@worlorderbillions.top", "Password": "##z$P{dTygVX "}
                  Source: worlorderbillions.topVirustotal: Detection: 11%Perma Link
                  Source: mail.worlorderbillions.topVirustotal: Detection: 13%Perma Link
                  Source: http://worlorderbillions.topVirustotal: Detection: 11%Perma Link
                  Source: http://mail.worlorderbillions.topVirustotal: Detection: 13%Perma Link
                  Source: PDT_7367027738832_789257820__________________________.exeReversingLabs: Detection: 34%
                  Source: PDT_7367027738832_789257820__________________________.exeVirustotal: Detection: 28%Perma Link
                  Source: PDT_7367027738832_789257820__________________________.exeJoe Sandbox ML: detected
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: PDT_7367027738832_789257820__________________________.exe, 00000000.00000003.1675128600.00000000039B0000.00000004.00001000.00020000.00000000.sdmp, PDT_7367027738832_789257820__________________________.exe, 00000000.00000003.1672898745.0000000003810000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: PDT_7367027738832_789257820__________________________.exe, 00000000.00000003.1675128600.00000000039B0000.00000004.00001000.00020000.00000000.sdmp, PDT_7367027738832_789257820__________________________.exe, 00000000.00000003.1672898745.0000000003810000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00774696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00774696
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077C93C FindFirstFileW,FindClose,0_2_0077C93C
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0077C9C7
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0077F200
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0077F35D
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0077F65E
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00773A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00773A2B
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00773D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00773D4E
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0077BF27
                  Source: global trafficTCP traffic: 192.168.2.4:49730 -> 185.244.151.84:587
                  Source: Joe Sandbox ViewIP Address: 185.244.151.84 185.244.151.84
                  Source: Joe Sandbox ViewIP Address: 185.244.151.84 185.244.151.84
                  Source: global trafficTCP traffic: 192.168.2.4:49730 -> 185.244.151.84:587
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007825E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007825E2
                  Source: unknownDNS traffic detected: queries for: mail.worlorderbillions.top
                  Source: RegSvcs.exe, 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2933163333.0000000005C40000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2931383440.0000000000EF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: RegSvcs.exe, 00000001.00000002.2933163333.0000000005C81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: RegSvcs.exe, 00000001.00000002.2933163333.0000000005C7C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2933163333.0000000005C40000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2931383440.0000000000EF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                  Source: RegSvcs.exe, 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2933163333.0000000005C40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
                  Source: RegSvcs.exe, 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.worlorderbillions.top
                  Source: RegSvcs.exe, 00000001.00000002.2933163333.0000000005C7C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2933163333.0000000005C40000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2931383440.0000000000EF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: RegSvcs.exe, 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://worlorderbillions.top
                  Source: PDT_7367027738832_789257820__________________________.exe, 00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2930664399.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: RegSvcs.exe, 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2933163333.0000000005C40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, cPKWk.cs.Net Code: ALVOhGvF
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0078425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0078425A
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00784458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00784458
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0078425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0078425A
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00770219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00770219
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0079CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0079CDAC

                  System Summary

                  barindex
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: This is a third-party compiled AutoIt script.0_2_00713B4C
                  Source: PDT_7367027738832_789257820__________________________.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: PDT_7367027738832_789257820__________________________.exe, 00000000.00000000.1662330367.00000000007C5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c1ba35a3-8
                  Source: PDT_7367027738832_789257820__________________________.exe, 00000000.00000000.1662330367.00000000007C5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_fdde1edc-f
                  Source: PDT_7367027738832_789257820__________________________.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_00b06ef5-f
                  Source: PDT_7367027738832_789257820__________________________.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_1189c212-4
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00774021: CreateFileW,DeviceIoControl,CloseHandle,0_2_00774021
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00768858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00768858
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0077545F
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0071E8000_2_0071E800
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0073DBB50_2_0073DBB5
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0071E0600_2_0071E060
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0079804A0_2_0079804A
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007241400_2_00724140
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007324050_2_00732405
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007465220_2_00746522
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0074267E0_2_0074267E
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007906650_2_00790665
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007268430_2_00726843
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0073283A0_2_0073283A
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007489DF0_2_007489DF
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00728A0E0_2_00728A0E
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00790AE20_2_00790AE2
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00746A940_2_00746A94
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00778B130_2_00778B13
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0076EB070_2_0076EB07
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0073CD610_2_0073CD61
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007470060_2_00747006
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0072710E0_2_0072710E
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007231900_2_00723190
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007112870_2_00711287
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007333C70_2_007333C7
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0073F4190_2_0073F419
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007316C40_2_007316C4
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007256800_2_00725680
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007378D30_2_007378D3
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007258C00_2_007258C0
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00731BB80_2_00731BB8
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00749D050_2_00749D05
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0071FE400_2_0071FE40
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0073BFE60_2_0073BFE6
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00731FD00_2_00731FD0
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_009F36700_2_009F3670
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00D893701_2_00D89370
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00D84A981_2_00D84A98
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00D89B301_2_00D89B30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00D83E801_2_00D83E80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00D8CE801_2_00D8CE80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00D841C81_2_00D841C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E7BCF81_2_05E7BCF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E7DC9D1_2_05E7DC9D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E73F401_2_05E73F40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E756D01_2_05E756D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E700401_2_05E70040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E78B901_2_05E78B90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E72AF81_2_05E72AF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E79AD01_2_05E79AD0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E74FF01_2_05E74FF0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E732381_2_05E73238
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: String function: 00730D27 appears 70 times
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: String function: 00717F41 appears 35 times
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: String function: 00738B40 appears 42 times
                  Source: PDT_7367027738832_789257820__________________________.exe, 00000000.00000003.1672898745.0000000003933000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PDT_7367027738832_789257820__________________________.exe
                  Source: PDT_7367027738832_789257820__________________________.exe, 00000000.00000003.1673063118.0000000003ADD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PDT_7367027738832_789257820__________________________.exe
                  Source: PDT_7367027738832_789257820__________________________.exe, 00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename7cd24d27-165d-4f93-b261-279cc8948863.exe4 vs PDT_7367027738832_789257820__________________________.exe
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, 6oQOw74dfIt.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, aMIWm.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077A2D5 GetLastError,FormatMessageW,0_2_0077A2D5
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00768713 AdjustTokenPrivileges,CloseHandle,0_2_00768713
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00768CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00768CC3
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0077B59E
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0078F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0078F121
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077C602 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0077C602
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00714FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00714FE9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeFile created: C:\Users\user\AppData\Local\Temp\aut6466.tmpJump to behavior
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: PDT_7367027738832_789257820__________________________.exeReversingLabs: Detection: 34%
                  Source: PDT_7367027738832_789257820__________________________.exeVirustotal: Detection: 28%
                  Source: unknownProcess created: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe "C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe"
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe"
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: PDT_7367027738832_789257820__________________________.exeStatic file information: File size 1091584 > 1048576
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: PDT_7367027738832_789257820__________________________.exe, 00000000.00000003.1675128600.00000000039B0000.00000004.00001000.00020000.00000000.sdmp, PDT_7367027738832_789257820__________________________.exe, 00000000.00000003.1672898745.0000000003810000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: PDT_7367027738832_789257820__________________________.exe, 00000000.00000003.1675128600.00000000039B0000.00000004.00001000.00020000.00000000.sdmp, PDT_7367027738832_789257820__________________________.exe, 00000000.00000003.1672898745.0000000003810000.00000004.00001000.00020000.00000000.sdmp
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: PDT_7367027738832_789257820__________________________.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0078C304 LoadLibraryA,GetProcAddress,0_2_0078C304
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0071C590 push eax; retn 0071h0_2_0071C599
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00778719 push FFFFFF8Bh; iretd 0_2_0077871B
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0073E94F push edi; ret 0_2_0073E951
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0073EA68 push esi; ret 0_2_0073EA6A
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00738B85 push ecx; ret 0_2_00738B98
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0073EC43 push esi; ret 0_2_0073EC45
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0073ED2C push edi; ret 0_2_0073ED2E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E73AD7 push ebx; retf 1_2_05E73ADA
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00714A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00714A35
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007955FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_007955FD
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007333C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_007333C7
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6998Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 721Jump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-98481
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeAPI coverage: 4.7 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00774696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00774696
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077C93C FindFirstFileW,FindClose,0_2_0077C93C
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0077C9C7
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0077F200
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0077F35D
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0077F65E
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00773A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00773A2B
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00773D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00773D4E
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0077BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0077BF27
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00714AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00714AFE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99874Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99546Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99218Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99109Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98999Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98763Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98545Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98435Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98218Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98108Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97999Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97780Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97671Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97452Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97343Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97124Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97015Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96796Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96687Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96577Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96468Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96358Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96249Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96140Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95921Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.2933163333.0000000005C40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeAPI call chain: ExitProcess graph end nodegraph_0-97882
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007841FD BlockInput,0_2_007841FD
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00713B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00713B4C
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00745CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00745CCC
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0078C304 LoadLibraryA,GetProcAddress,0_2_0078C304
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_009F3500 mov eax, dword ptr fs:[00000030h]0_2_009F3500
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_009F3560 mov eax, dword ptr fs:[00000030h]0_2_009F3560
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_009F1ED0 mov eax, dword ptr fs:[00000030h]0_2_009F1ED0
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007681F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007681F7
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0073A364 SetUnhandledExceptionFilter,0_2_0073A364
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0073A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0073A395
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 8FF008Jump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00768C93 LogonUserW,0_2_00768C93
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00713B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00713B4C
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00714A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00714A35
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00774EF5 mouse_event,0_2_00774EF5
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007681F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007681F7
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00774C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00774C03
                  Source: PDT_7367027738832_789257820__________________________.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: PDT_7367027738832_789257820__________________________.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0073886B cpuid 0_2_0073886B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_007450D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_007450D7
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00752230 GetUserNameW,0_2_00752230
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_0074418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0074418A
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00714AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00714AFE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2931527386.000000000292A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2930664399.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2931527386.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: PDT_7367027738832_789257820__________________________.exe PID: 7440, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7456, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: PDT_7367027738832_789257820__________________________.exeBinary or memory string: WIN_81
                  Source: PDT_7367027738832_789257820__________________________.exeBinary or memory string: WIN_XP
                  Source: PDT_7367027738832_789257820__________________________.exeBinary or memory string: WIN_XPe
                  Source: PDT_7367027738832_789257820__________________________.exeBinary or memory string: WIN_VISTA
                  Source: PDT_7367027738832_789257820__________________________.exeBinary or memory string: WIN_7
                  Source: PDT_7367027738832_789257820__________________________.exeBinary or memory string: WIN_8
                  Source: PDT_7367027738832_789257820__________________________.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2930664399.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2931527386.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: PDT_7367027738832_789257820__________________________.exe PID: 7440, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7456, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PDT_7367027738832_789257820__________________________.exe.1080000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2931527386.000000000292A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2930664399.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2931527386.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: PDT_7367027738832_789257820__________________________.exe PID: 7440, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7456, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00786596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00786596
                  Source: C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exeCode function: 0_2_00786A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00786A5A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS38
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  1
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets141
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  11
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials121
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  PDT_7367027738832_789257820__________________________.exe34%ReversingLabsWin32.Trojan.Strab
                  PDT_7367027738832_789257820__________________________.exe29%VirustotalBrowse
                  PDT_7367027738832_789257820__________________________.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  worlorderbillions.top12%VirustotalBrowse
                  mail.worlorderbillions.top13%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://sectigo.com/CPS00%URL Reputationsafe
                  http://worlorderbillions.top12%VirustotalBrowse
                  http://mail.worlorderbillions.top13%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  worlorderbillions.top
                  185.244.151.84
                  truefalseunknown
                  mail.worlorderbillions.top
                  unknown
                  unknowntrueunknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://sectigo.com/CPS0RegSvcs.exe, 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2933163333.0000000005C40000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://mail.worlorderbillions.topRegSvcs.exe, 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://account.dyn.com/PDT_7367027738832_789257820__________________________.exe, 00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2930664399.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                    high
                    http://worlorderbillions.topRegSvcs.exe, 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.244.151.84
                    worlorderbillions.topNetherlands
                    60117HSAEfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1430156
                    Start date and time:2024-04-23 08:29:26 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 56s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:PDT_7367027738832_789257820__________________________.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 56
                    • Number of non-executed functions: 268
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    08:30:18API Interceptor38x Sleep call for process: RegSvcs.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    185.244.151.84https://apiservices.krxd.net/click_tracker/track?kxconfid=whjxbtb0h&_knopii=1&kxcampaignid=P.C.C-Class.W206.L.MI&kxplacementid=module2findmycar&kxbrand=MB&clk=http://WMUHS.penseldraget.com/?email=projectassistant@gheenirrigation.comGet hashmaliciousHTMLPhisherBrowse
                    • wmuhs.penseldraget.com/?email=projectassistant@gheenirrigation.com&_knopii=1
                    https://sites.google.com/view/man-energy-solutions/halaman-mukaGet hashmaliciousHTMLPhisherBrowse
                    • man-energy-solution.duerbcek.com/
                    https://sites.google.com/view/asiatic-lloyd-maritime-llp/halaman-mukaGet hashmaliciousHTMLPhisherBrowse
                    • asiatic-lloyd-maritime.duerbcek.com/
                    https://sites.google.com/view/dnvlimited/halaman-mukaGet hashmaliciousUnknownBrowse
                    • dnv-limited.duerbcek.com/
                    https://veolia-dot-yamm-track.appspot.com/Redirect?ukey=1rYd-S6h21KvcEPO5BLkBWp1KOKV2-Rm-t86fM2DfnMk-177924590&key=YAMMID-18720160&link=http%3A%2F%2Fthrh.tumyphie.com%2FGet hashmaliciousUnknownBrowse
                    • thrh.tumyphie.com/
                    http://mollkiss.mekythkit.onlineGet hashmaliciousUnknownBrowse
                    • mollkiss.mekythkit.online/
                    Friday_ February 5th_ 2021 64427 a.m._ 20210205064427.64791275BD060468@juidine.com.htmlGet hashmaliciousHTMLPhisherBrowse
                    • 185.244.151.84/cgi-sys/suspendedpage.cgi
                    Thursday, February 4th, 2021 103440 p.m., 20210204223440.464D4D4AD1BFDE50@juidine.com.htmlGet hashmaliciousHTMLPhisherBrowse
                    • 185.244.151.84/cgi-sys/suspendedpage.cgi
                    Adjunto-30.docGet hashmaliciousUnknownBrowse
                    • alkamefood.com/y/P/
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    HSAESecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.1274.17126.exeGet hashmaliciousAgentTeslaBrowse
                    • 194.36.191.196
                    Arba Outstanding Statement.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                    • 185.244.151.84
                    WZM.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                    • 185.244.151.84
                    z1RFQ20838_CMC_RITM50736681.exeGet hashmaliciousAgentTeslaBrowse
                    • 194.36.191.196
                    https://doggygangers.com/YfMv2QsjpCQl845BWSYNfNOQitweyze_Z6lIlrRr43MRjX_HrM/downloadsdownloadfile/dwnl_standart.phpGet hashmaliciousLummaC, PureLog Stealer, RedLine, SectopRAT, zgRATBrowse
                    • 194.36.191.196
                    BOQ- AE20003 0084 20240408 .exeGet hashmaliciousAgentTeslaBrowse
                    • 194.36.191.196
                    a9wJzPSyH4.exeGet hashmaliciousAgentTeslaBrowse
                    • 185.198.59.26
                    4938730).vbsGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                    • 194.36.191.196
                    PI-23-24-041 AEH-CIPL 6-202424-014 .exeGet hashmaliciousAgentTeslaBrowse
                    • 194.36.191.196
                    CFD.exeGet hashmaliciousAgentTeslaBrowse
                    • 185.198.59.26
                    No context
                    No context
                    Process:C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):135338
                    Entropy (8bit):7.871118629471488
                    Encrypted:false
                    SSDEEP:3072:ipkcINbb1VFJVkkJUg5Ljhikp84+QHFE5nXCIm:+9ibxJN5Zikpr+aFE5nXC/
                    MD5:EFB3F6DF1F295F481622D7C5CCB1A932
                    SHA1:473BE1EA16F0E39EDEFFD1551E78D43B5C355B49
                    SHA-256:F3B26F7DFD82154F3F813973AE6F44739997DB8395EEA32D93B490CE34F3ABCD
                    SHA-512:F03FE97A58136159F0A908EF793BFF90042035F0EA8450FF21FABE9E2551B6E5B6A0C1629229574D7A969CABC9A9663A0B1D147C688C1DD2ABFCD2896D1FEF8E
                    Malicious:false
                    Reputation:low
                    Preview:EA06......t....0..k.~..q0..* .D.sx.....8...;..D._.T~...G.9.e"0YL.I.......Yx.Tj.j..!3.^$.Z.b.7.Ea..v.\....]...0.%b.|.N...5.N......V..&s..B.A.W..1..V.....Q...*.... ..P..y..fk.....'`.X.U.....0..@..D. ....#.\uJ....~...^....hkuy..'.....P...N.........z$.s,..-....a..3 0.....Ng....E3..........'...J..Q.......i-..&.....@A,..G.r.....`..A......ra..V...D.`.,Pk ......e.\.#.......t.7.E..n.S....}4..:....(rN.V5.....w^.E..5.d.....k.MN.5L..+........`.....)..#.j.....G}V..6.{.M.....w..@....~.g0.k.7...V(.{./.D.t's..^.@..&..\.X.V|.-].....3^/.....nv..._.Qi....m..........._.......L.2....6..&.....P....`.B2.([......<.."......O..l..".i.C.gC.q.N.9.u.W..d2.....k..0....-r...>M:a....}.f...O/.)}.e6.C.....y5...*..}r.rq.....R.O..:.6...k...\[...q.|Z.k..R.....i.....Q.... s..s......8.Q.vv...6sQ..*..$..*.P..J4.!... .u........6..@..4..#..jW...0..5.J@.qG......^a=.Lk3......D.U.tv.X..k.vey.V*..._.Th5.$:s8.I*.q..];.....].3.P........Nf@d.B......ub5...j...`.x......1..1@.....!.}5ZM..r.-...(
                    Process:C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):9886
                    Entropy (8bit):7.593008664383745
                    Encrypted:false
                    SSDEEP:192:m+cKsSwxOCyTkff82lMdISQUNa53yJuldkiXkXA+rh+8E+h+Zo:97sSwcHkHUOSQl3yJulOiqA+rh+C0o
                    MD5:E7A18870DAC517F366A3B35945EA763D
                    SHA1:E37E4AB421336A306C8BF3FE37C2AAC3F5791DA0
                    SHA-256:A5FCC71230508F95FDB9F77DFB5CA8B616D1652E6C42B15D319F2EE006B2ECCB
                    SHA-512:BEFA9FB462D1A2F50B07429DF6AA58C3FAA345324E7E41B6D446F47FB1EF2980053F59B00D13C7296B777978D31CE61B4A5A847E412F3F7440A611A01CFEB48C
                    Malicious:false
                    Reputation:low
                    Preview:EA06..t0.M'.)..e4.N'.).......T9..l.0L.s.5..3..s.4.8.......k8.Yls....c..&S...k6...S....1.L&.i..i5.M,S....K.@...7...p. ....P.o...m.X.V........9....3...f....s2.Xf@.]..g3@..h.m.M.......8.l..6.....a........i4........g3Y...c ._..k4...d....H, ......Ac.H..g...(.F..=d....>....C`....@02..N@...u......Y..ab.M.]>.$....M.x>;$....N.j.;%....X.j.;%......j.;,....P'.b.5... .^..f./Z..@F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d...
                    Process:C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe
                    File Type:ASCII text, with very long lines (29744), with no line terminators
                    Category:dropped
                    Size (bytes):29744
                    Entropy (8bit):3.542100914255066
                    Encrypted:false
                    SSDEEP:768:wiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbiE+I76Md4vfF3if6gyT:wiTZ+2QoioGRk6ZklputwjpjBkCiw2R2
                    MD5:71E8B5EE10AAB19739C4A526BC2620C6
                    SHA1:CD1B7C9CB9219B95B81833CFA6F35BA65D7B3A6B
                    SHA-256:EEBBB96329FC3131CAAAE40992740BAB13470256BBDAB06670DB75218EDEEE57
                    SHA-512:2986E1302A07B508EE8CF37F69D758984A88DEB082A4FF0AF1E9D514F6925DF3A8EC1B5AEFF0B8658E0C9D9C713CABBDCF0D72405470B7D989E0BB7628F63EDB
                    Malicious:false
                    Reputation:low
                    Preview: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
                    Process:C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):240128
                    Entropy (8bit):6.3048884803521394
                    Encrypted:false
                    SSDEEP:6144:ImmywGQmmmmWOLMmmmhRgXQoGnbcP0DXj7wzehurtmtkzy7jyj30RKkyTs/Cxo4V:ImmywGQmmmmWOLMmmm7gXQoGnbcP0DTA
                    MD5:F2B44F628F3C6B12A36358D27BDC4903
                    SHA1:E017AFC451E195DA46C0E8A0FB35069860C4AB53
                    SHA-256:6E595FE5D6A709AAFE767B31475F2E31BA95E201B8CD2B889B6108E2E87C37CC
                    SHA-512:525583DA03C904195A9E2E026D5E2A1232B15F7A2FB026BA051B64ACC9C8AE16735272ADCAD9EA229EC0438EF3DBFE5E4D468FB131B5C67E331FB360B7094883
                    Malicious:false
                    Reputation:low
                    Preview:...9;0Y0UAXW..80.0QAXW09x0Y0QAXW0980Y0QAXW0980Y0QAXW0980Y0QA.W096/.>Q.Q...9|...)1$.IJ_>B0,x4QWV_-.3$x%EW.Y7....w]V\Uw=\K|W0980Y0..XW|8;0..p'XW0980Y0.AZV;830Y.RAX_0980Y0..[W0.80Y.RAXWp98.Y0QCXW4980Y0QA\W0980Y0QA\W0;80Y0QAZWp.80I0QQXW09(0Y QAXW09(0Y0QAXW0980..RA.W098.Z0.DXW0980Y0QAXW0980Y0Q.[W<980Y0QAXW0980Y0QAXW0980Y0QAXW0980Y0QAXW0980Y0QAXW098.Y0YAXW0980Y0QAPw09p0Y0QAXW0980wD49,W09l.Z0QaXW0.;0Y2QAXW0980Y0QAXW.98PwB"3;W09~5Y0Q.[W0?80Y.RAXW0980Y0QAXWp98pwB4-740940Y0Q.[W0;80Y.RAXW0980Y0QAXWp98rY0QAXW0980Y0QAXW..;0Y0QA.W09:0\0..ZW..90Z0QAYW0?80Y0QAXW0980Y0QAXW0980Y0QAXW0980Y0QAXW0980Y0QAXW-.......*.3Z7...&.T.+..I..W.%.C$....U.....~EW..W.6....X...L.8\IP.....PRA_). .6Y.D....j.Mx{.6?.".F..^We.~....z...XDg`..D..;8].Y@)\4o.6VXJY.2.@XW09........YAsjt3^_lEHo....eS .....'0QA<W09J0Y00AXWw98060QA6W09F0Y0/AXWv980.0QAoW09.0Y0<AXW.980'0QA.*?6...Y".W0980l..q.:...o....aA.Fk;....3.r.j\c.N0.Gztw.._.<|./b26r..P1?<5[7UBTj>r...SE\R2><3U._.........h..A....J.=XW0980.0Q.XW0..0.0QA.W.9..Y0Q..W.9.0..A
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.924475110769334
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:PDT_7367027738832_789257820__________________________.exe
                    File size:1'091'584 bytes
                    MD5:656aeda4f4a3ad9555f6d88c74fc0705
                    SHA1:3da5e7c273689cb837de918b39c2650484cd342e
                    SHA256:a3f5e3e9e01fdd51293410aa65759c2ea0ba6fd96860b6b9e9e0cea139f4d939
                    SHA512:d9300bdd48c28c8f148595c6db9dcb20ee19f2f44c524f73f7af1037ca36ecaf239a124ec193143ef76611fd8dbb9f21ff2d456c626865d81ad5ed28dd6e40e3
                    SSDEEP:24576:BAHnh+eWsN3skA4RV1Hom2KXMmHa5a/M0IQe5:Yh+ZkldoPK8Ya5a/M06
                    TLSH:F7359C3263918325FFAB9E73DB5DB20D56BC6D250123852FD29C2F79A9F01B1122D263
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                    Icon Hash:1a5ada12a98c3689
                    Entrypoint:0x42800a
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66269698 [Mon Apr 22 16:55:52 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:1
                    File Version Major:5
                    File Version Minor:1
                    Subsystem Version Major:5
                    Subsystem Version Minor:1
                    Import Hash:afcdf79be1557326c854b6e20cb900a7
                    Instruction
                    call 00007F7C248769EDh
                    jmp 00007F7C248697A4h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    push edi
                    push esi
                    mov esi, dword ptr [esp+10h]
                    mov ecx, dword ptr [esp+14h]
                    mov edi, dword ptr [esp+0Ch]
                    mov eax, ecx
                    mov edx, ecx
                    add eax, esi
                    cmp edi, esi
                    jbe 00007F7C2486992Ah
                    cmp edi, eax
                    jc 00007F7C24869C8Eh
                    bt dword ptr [004C41FCh], 01h
                    jnc 00007F7C24869929h
                    rep movsb
                    jmp 00007F7C24869C3Ch
                    cmp ecx, 00000080h
                    jc 00007F7C24869AF4h
                    mov eax, edi
                    xor eax, esi
                    test eax, 0000000Fh
                    jne 00007F7C24869930h
                    bt dword ptr [004BF324h], 01h
                    jc 00007F7C24869E00h
                    bt dword ptr [004C41FCh], 00000000h
                    jnc 00007F7C24869ACDh
                    test edi, 00000003h
                    jne 00007F7C24869ADEh
                    test esi, 00000003h
                    jne 00007F7C24869ABDh
                    bt edi, 02h
                    jnc 00007F7C2486992Fh
                    mov eax, dword ptr [esi]
                    sub ecx, 04h
                    lea esi, dword ptr [esi+04h]
                    mov dword ptr [edi], eax
                    lea edi, dword ptr [edi+04h]
                    bt edi, 03h
                    jnc 00007F7C24869933h
                    movq xmm1, qword ptr [esi]
                    sub ecx, 08h
                    lea esi, dword ptr [esi+08h]
                    movq qword ptr [edi], xmm1
                    lea edi, dword ptr [edi+08h]
                    test esi, 00000007h
                    je 00007F7C24869985h
                    bt esi, 03h
                    Programming Language:
                    • [ASM] VS2013 build 21005
                    • [ C ] VS2013 build 21005
                    • [C++] VS2013 build 21005
                    • [ C ] VS2008 SP1 build 30729
                    • [IMP] VS2008 SP1 build 30729
                    • [ASM] VS2013 UPD5 build 40629
                    • [RES] VS2013 build 21005
                    • [LNK] VS2013 UPD5 build 40629
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x401a8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1090000x7134.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0xc80000x401a80x402002f7019fca6c4ccb25f7514f6cdc8adc6False0.7242819505360624data7.205323090449387IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x1090000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0xc84580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                    RT_ICON0xc85800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                    RT_ICON0xc86a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                    RT_ICON0xc87d00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishGreat Britain0.046891636105524666
                    RT_MENU0xd8ff80x50dataEnglishGreat Britain0.9
                    RT_STRING0xd90480x594dataEnglishGreat Britain0.3333333333333333
                    RT_STRING0xd95dc0x68adataEnglishGreat Britain0.2747909199522103
                    RT_STRING0xd9c680x490dataEnglishGreat Britain0.3715753424657534
                    RT_STRING0xda0f80x5fcdataEnglishGreat Britain0.3087467362924282
                    RT_STRING0xda6f40x65cdataEnglishGreat Britain0.34336609336609336
                    RT_STRING0xdad500x466dataEnglishGreat Britain0.3605683836589698
                    RT_STRING0xdb1b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                    RT_RCDATA0xdb3100x2c94adata1.0003614418242954
                    RT_GROUP_ICON0x107c5c0x14dataEnglishGreat Britain1.25
                    RT_GROUP_ICON0x107c700x14dataEnglishGreat Britain1.25
                    RT_GROUP_ICON0x107c840x14dataEnglishGreat Britain1.15
                    RT_GROUP_ICON0x107c980x14dataEnglishGreat Britain1.25
                    RT_VERSION0x107cac0x10cdataEnglishGreat Britain0.5895522388059702
                    RT_MANIFEST0x107db80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                    DLLImport
                    WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                    VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                    MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                    WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                    PSAPI.DLLGetProcessMemoryInfo
                    IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                    USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                    UxTheme.dllIsThemeActive
                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                    USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                    GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                    COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                    SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                    OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                    Language of compilation systemCountry where language is spokenMap
                    EnglishGreat Britain
                    TimestampSource PortDest PortSource IPDest IP
                    Apr 23, 2024 08:30:19.790730000 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:19.984821081 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:19.984921932 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:21.098953962 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:21.100081921 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:21.294198990 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:21.294487953 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:21.489701986 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:21.537491083 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:21.561920881 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:21.762624979 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:21.762651920 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:21.762664080 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:21.762680054 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:21.762744904 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:21.762911081 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:21.764276981 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:21.793900967 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:21.988174915 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:22.004837990 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:22.198937893 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:22.206438065 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:22.400878906 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:22.401338100 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:22.601835012 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:22.602121115 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:22.796298981 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:22.796678066 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:23.001673937 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:23.002171993 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:23.196013927 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:23.196806908 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:23.196868896 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:23.196894884 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:23.196918011 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:30:23.391283035 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:23.391304016 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:23.391314030 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:23.391381025 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:23.397314072 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:30:23.443773031 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:32:00.472084999 CEST49730587192.168.2.4185.244.151.84
                    Apr 23, 2024 08:32:00.666809082 CEST58749730185.244.151.84192.168.2.4
                    Apr 23, 2024 08:32:00.673512936 CEST49730587192.168.2.4185.244.151.84
                    TimestampSource PortDest PortSource IPDest IP
                    Apr 23, 2024 08:30:19.303746939 CEST6316953192.168.2.41.1.1.1
                    Apr 23, 2024 08:30:19.782093048 CEST53631691.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Apr 23, 2024 08:30:19.303746939 CEST192.168.2.41.1.1.10x8c33Standard query (0)mail.worlorderbillions.topA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Apr 23, 2024 08:30:19.782093048 CEST1.1.1.1192.168.2.40x8c33No error (0)mail.worlorderbillions.topworlorderbillions.topCNAME (Canonical name)IN (0x0001)false
                    Apr 23, 2024 08:30:19.782093048 CEST1.1.1.1192.168.2.40x8c33No error (0)worlorderbillions.top185.244.151.84A (IP address)IN (0x0001)false
                    TimestampSource PortDest PortSource IPDest IPCommands
                    Apr 23, 2024 08:30:21.098953962 CEST58749730185.244.151.84192.168.2.4220-hosting2.ro.hostsailor.com ESMTP Exim 4.96.2 #2 Tue, 23 Apr 2024 08:30:20 +0200
                    220-We do not authorize the use of this system to transport unsolicited,
                    220 and/or bulk e-mail.
                    Apr 23, 2024 08:30:21.100081921 CEST49730587192.168.2.4185.244.151.84EHLO 141700
                    Apr 23, 2024 08:30:21.294198990 CEST58749730185.244.151.84192.168.2.4250-hosting2.ro.hostsailor.com Hello 141700 [154.16.192.163]
                    250-SIZE 52428800
                    250-8BITMIME
                    250-PIPELINING
                    250-PIPECONNECT
                    250-STARTTLS
                    250 HELP
                    Apr 23, 2024 08:30:21.294487953 CEST49730587192.168.2.4185.244.151.84STARTTLS
                    Apr 23, 2024 08:30:21.489701986 CEST58749730185.244.151.84192.168.2.4220 TLS go ahead

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:08:30:15
                    Start date:23/04/2024
                    Path:C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe"
                    Imagebase:0x710000
                    File size:1'091'584 bytes
                    MD5 hash:656AEDA4F4A3AD9555F6D88C74FC0705
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1677527485.0000000001080000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:08:30:16
                    Start date:23/04/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe"
                    Imagebase:0x670000
                    File size:45'984 bytes
                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2931527386.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2931527386.000000000292A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2930664399.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2930664399.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2931527386.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2931527386.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:4.1%
                      Dynamic/Decrypted Code Coverage:0.4%
                      Signature Coverage:5.6%
                      Total number of Nodes:2000
                      Total number of Limit Nodes:175
                      execution_graph 97262 737e93 97263 737e9f _raise 97262->97263 97299 73a048 GetStartupInfoW 97263->97299 97265 737ea4 97301 738dbc GetProcessHeap 97265->97301 97267 737efc 97268 737f07 97267->97268 97384 737fe3 58 API calls 3 library calls 97267->97384 97302 739d26 97268->97302 97271 737f0d 97272 737f18 __RTC_Initialize 97271->97272 97385 737fe3 58 API calls 3 library calls 97271->97385 97323 73d812 97272->97323 97275 737f27 97276 737f33 GetCommandLineW 97275->97276 97386 737fe3 58 API calls 3 library calls 97275->97386 97342 745173 GetEnvironmentStringsW 97276->97342 97279 737f32 97279->97276 97282 737f4d 97285 737f58 97282->97285 97387 7332f5 58 API calls 3 library calls 97282->97387 97352 744fa8 97285->97352 97286 737f5e 97287 737f69 97286->97287 97388 7332f5 58 API calls 3 library calls 97286->97388 97366 73332f 97287->97366 97290 737f71 97291 737f7c __wwincmdln 97290->97291 97389 7332f5 58 API calls 3 library calls 97290->97389 97372 71492e 97291->97372 97294 737f90 97295 737f9f 97294->97295 97390 733598 58 API calls _doexit 97294->97390 97391 733320 58 API calls _doexit 97295->97391 97298 737fa4 _raise 97300 73a05e 97299->97300 97300->97265 97301->97267 97392 7333c7 36 API calls 2 library calls 97302->97392 97304 739d2b 97393 739f7c InitializeCriticalSectionAndSpinCount ___lock_fhandle 97304->97393 97306 739d30 97307 739d34 97306->97307 97395 739fca TlsAlloc 97306->97395 97394 739d9c 61 API calls 2 library calls 97307->97394 97310 739d39 97310->97271 97311 739d46 97311->97307 97312 739d51 97311->97312 97396 738a15 97312->97396 97315 739d93 97404 739d9c 61 API calls 2 library calls 97315->97404 97318 739d98 97318->97271 97319 739d72 97319->97315 97320 739d78 97319->97320 97403 739c73 58 API calls 4 library calls 97320->97403 97322 739d80 GetCurrentThreadId 97322->97271 97324 73d81e _raise 97323->97324 97416 739e4b 97324->97416 97326 73d825 97327 738a15 __calloc_crt 58 API calls 97326->97327 97329 73d836 97327->97329 97328 73d8a1 GetStartupInfoW 97336 73d8b6 97328->97336 97339 73d9e5 97328->97339 97329->97328 97330 73d841 _raise @_EH4_CallFilterFunc@8 97329->97330 97330->97275 97331 73daad 97425 73dabd LeaveCriticalSection _doexit 97331->97425 97333 738a15 __calloc_crt 58 API calls 97333->97336 97334 73da32 GetStdHandle 97334->97339 97335 73da45 GetFileType 97335->97339 97336->97333 97337 73d904 97336->97337 97336->97339 97338 73d938 GetFileType 97337->97338 97337->97339 97423 73a06b InitializeCriticalSectionAndSpinCount 97337->97423 97338->97337 97339->97331 97339->97334 97339->97335 97424 73a06b InitializeCriticalSectionAndSpinCount 97339->97424 97343 745184 97342->97343 97344 737f43 97342->97344 97465 738a5d 58 API calls 2 library calls 97343->97465 97348 744d6b GetModuleFileNameW 97344->97348 97346 7451c0 FreeEnvironmentStringsW 97346->97344 97347 7451aa _memmove 97347->97346 97349 744d9f _wparse_cmdline 97348->97349 97351 744ddf _wparse_cmdline 97349->97351 97466 738a5d 58 API calls 2 library calls 97349->97466 97351->97282 97353 744fc1 __NMSG_WRITE 97352->97353 97357 744fb9 97352->97357 97354 738a15 __calloc_crt 58 API calls 97353->97354 97362 744fea __NMSG_WRITE 97354->97362 97355 745041 97356 732f95 _free 58 API calls 97355->97356 97356->97357 97357->97286 97358 738a15 __calloc_crt 58 API calls 97358->97362 97359 745066 97360 732f95 _free 58 API calls 97359->97360 97360->97357 97362->97355 97362->97357 97362->97358 97362->97359 97363 74507d 97362->97363 97467 744857 58 API calls 2 library calls 97362->97467 97468 739006 IsProcessorFeaturePresent 97363->97468 97365 745089 97365->97286 97367 73333b __IsNonwritableInCurrentImage 97366->97367 97491 73a711 97367->97491 97369 733359 __initterm_e 97371 733378 __cinit __IsNonwritableInCurrentImage 97369->97371 97494 732f80 97369->97494 97371->97290 97373 714948 97372->97373 97383 7149e7 97372->97383 97374 714982 IsThemeActive 97373->97374 97529 7335ac 97374->97529 97378 7149ae 97541 714a5b SystemParametersInfoW SystemParametersInfoW 97378->97541 97380 7149ba 97542 713b4c 97380->97542 97382 7149c2 SystemParametersInfoW 97382->97383 97383->97294 97384->97268 97385->97272 97386->97279 97390->97295 97391->97298 97392->97304 97393->97306 97394->97310 97395->97311 97398 738a1c 97396->97398 97399 738a57 97398->97399 97400 738a3a 97398->97400 97405 745446 97398->97405 97399->97315 97402 73a026 TlsSetValue 97399->97402 97400->97398 97400->97399 97413 73a372 Sleep 97400->97413 97402->97319 97403->97322 97404->97318 97406 745451 97405->97406 97410 74546c 97405->97410 97407 74545d 97406->97407 97406->97410 97414 738d68 58 API calls __getptd_noexit 97407->97414 97408 74547c HeapAlloc 97408->97410 97411 745462 97408->97411 97410->97408 97410->97411 97415 7335e1 DecodePointer 97410->97415 97411->97398 97413->97400 97414->97411 97415->97410 97417 739e6f EnterCriticalSection 97416->97417 97418 739e5c 97416->97418 97417->97326 97426 739ed3 97418->97426 97420 739e62 97420->97417 97450 7332f5 58 API calls 3 library calls 97420->97450 97423->97337 97424->97339 97425->97330 97427 739edf _raise 97426->97427 97428 739f00 97427->97428 97429 739ee8 97427->97429 97435 739f21 _raise 97428->97435 97454 738a5d 58 API calls 2 library calls 97428->97454 97451 73a3ab 58 API calls __NMSG_WRITE 97429->97451 97431 739eed 97452 73a408 58 API calls 5 library calls 97431->97452 97434 739f15 97437 739f2b 97434->97437 97438 739f1c 97434->97438 97435->97420 97436 739ef4 97453 7332df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97436->97453 97440 739e4b __lock 58 API calls 97437->97440 97455 738d68 58 API calls __getptd_noexit 97438->97455 97442 739f32 97440->97442 97444 739f57 97442->97444 97445 739f3f 97442->97445 97457 732f95 97444->97457 97456 73a06b InitializeCriticalSectionAndSpinCount 97445->97456 97448 739f4b 97463 739f73 LeaveCriticalSection _doexit 97448->97463 97451->97431 97452->97436 97454->97434 97455->97435 97456->97448 97458 732f9e RtlFreeHeap 97457->97458 97462 732fc7 _free 97457->97462 97459 732fb3 97458->97459 97458->97462 97464 738d68 58 API calls __getptd_noexit 97459->97464 97461 732fb9 GetLastError 97461->97462 97462->97448 97463->97435 97464->97461 97465->97347 97466->97351 97467->97362 97469 739011 97468->97469 97474 738e99 97469->97474 97473 73902c 97473->97365 97475 738eb3 _memset __call_reportfault 97474->97475 97476 738ed3 IsDebuggerPresent 97475->97476 97482 73a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 97476->97482 97479 738fba 97481 73a380 GetCurrentProcess TerminateProcess 97479->97481 97480 738f97 __call_reportfault 97483 73c836 97480->97483 97481->97473 97482->97480 97484 73c840 IsProcessorFeaturePresent 97483->97484 97485 73c83e 97483->97485 97487 745b5a 97484->97487 97485->97479 97490 745b09 5 API calls 2 library calls 97487->97490 97489 745c3d 97489->97479 97490->97489 97492 73a714 EncodePointer 97491->97492 97492->97492 97493 73a72e 97492->97493 97493->97369 97497 732e84 97494->97497 97496 732f8b 97496->97371 97498 732e90 _raise 97497->97498 97505 733457 97498->97505 97504 732eb7 _raise 97504->97496 97506 739e4b __lock 58 API calls 97505->97506 97507 732e99 97506->97507 97508 732ec8 DecodePointer DecodePointer 97507->97508 97509 732ea5 97508->97509 97510 732ef5 97508->97510 97519 732ec2 97509->97519 97510->97509 97522 7389e4 59 API calls 2 library calls 97510->97522 97512 732f07 97513 732f58 EncodePointer EncodePointer 97512->97513 97514 732f2c 97512->97514 97523 738aa4 61 API calls 2 library calls 97512->97523 97513->97509 97514->97509 97517 732f46 EncodePointer 97514->97517 97524 738aa4 61 API calls 2 library calls 97514->97524 97517->97513 97518 732f40 97518->97509 97518->97517 97525 733460 97519->97525 97522->97512 97523->97514 97524->97518 97528 739fb5 LeaveCriticalSection 97525->97528 97527 732ec7 97527->97504 97528->97527 97530 739e4b __lock 58 API calls 97529->97530 97531 7335b7 DecodePointer EncodePointer 97530->97531 97594 739fb5 LeaveCriticalSection 97531->97594 97533 7149a7 97534 733614 97533->97534 97535 733638 97534->97535 97536 73361e 97534->97536 97535->97378 97536->97535 97595 738d68 58 API calls __getptd_noexit 97536->97595 97538 733628 97596 738ff6 9 API calls __wsopen_nolock 97538->97596 97540 733633 97540->97378 97541->97380 97543 713b59 __write_nolock 97542->97543 97597 7177c7 97543->97597 97547 713b8c IsDebuggerPresent 97548 74d4ad MessageBoxA 97547->97548 97549 713b9a 97547->97549 97552 74d4c7 97548->97552 97550 713c73 97549->97550 97549->97552 97553 713bb7 97549->97553 97551 713c7a SetCurrentDirectoryW 97550->97551 97554 713c87 Mailbox 97551->97554 97821 717373 59 API calls Mailbox 97552->97821 97683 7173e5 97553->97683 97554->97382 97557 74d4d7 97563 74d4ed SetCurrentDirectoryW 97557->97563 97559 713bd5 GetFullPathNameW 97699 717d2c 97559->97699 97561 713c10 97708 720a8d 97561->97708 97563->97554 97594->97533 97595->97538 97596->97540 97850 730ff6 97597->97850 97599 7177e8 97600 730ff6 Mailbox 59 API calls 97599->97600 97601 713b63 GetCurrentDirectoryW 97600->97601 97602 713778 97601->97602 97603 7177c7 59 API calls 97602->97603 97604 71378e 97603->97604 97888 713d43 97604->97888 97606 7137ac 97607 714864 61 API calls 97606->97607 97608 7137c0 97607->97608 97609 717f41 59 API calls 97608->97609 97610 7137cd 97609->97610 97902 714f3d 97610->97902 97613 74d3ae 97973 7797e5 97613->97973 97614 7137ee Mailbox 97926 7181a7 97614->97926 97617 74d3cd 97620 732f95 _free 58 API calls 97617->97620 97622 74d3da 97620->97622 97624 714faa 84 API calls 97622->97624 97626 74d3e3 97624->97626 97631 713ee2 59 API calls 97626->97631 97627 717f41 59 API calls 97628 71381a 97627->97628 97933 718620 97628->97933 97630 71382c Mailbox 97633 717f41 59 API calls 97630->97633 97632 74d3fe 97631->97632 97634 713ee2 59 API calls 97632->97634 97635 713852 97633->97635 97636 74d41a 97634->97636 97637 718620 69 API calls 97635->97637 97638 714864 61 API calls 97636->97638 97640 713861 Mailbox 97637->97640 97639 74d43f 97638->97639 97641 713ee2 59 API calls 97639->97641 97643 7177c7 59 API calls 97640->97643 97642 74d44b 97641->97642 97644 7181a7 59 API calls 97642->97644 97645 71387f 97643->97645 97646 74d459 97644->97646 97937 713ee2 97645->97937 97648 713ee2 59 API calls 97646->97648 97650 74d468 97648->97650 97656 7181a7 59 API calls 97650->97656 97652 713899 97652->97626 97653 7138a3 97652->97653 97654 73313d _W_store_winword 60 API calls 97653->97654 97655 7138ae 97654->97655 97655->97632 97657 7138b8 97655->97657 97658 74d48a 97656->97658 97659 73313d _W_store_winword 60 API calls 97657->97659 97660 713ee2 59 API calls 97658->97660 97661 7138c3 97659->97661 97662 74d497 97660->97662 97661->97636 97663 7138cd 97661->97663 97662->97662 97664 73313d _W_store_winword 60 API calls 97663->97664 97665 7138d8 97664->97665 97665->97650 97666 713919 97665->97666 97668 713ee2 59 API calls 97665->97668 97666->97650 97667 713926 97666->97667 97953 71942e 97667->97953 97670 7138fc 97668->97670 97672 7181a7 59 API calls 97670->97672 97674 71390a 97672->97674 97675 713ee2 59 API calls 97674->97675 97675->97666 97678 7193ea 59 API calls 97680 713961 97678->97680 97679 719040 60 API calls 97679->97680 97680->97678 97680->97679 97681 713ee2 59 API calls 97680->97681 97682 7139a7 Mailbox 97680->97682 97681->97680 97682->97547 97684 7173f2 __write_nolock 97683->97684 97685 71740b 97684->97685 97686 74ee4b _memset 97684->97686 98843 7148ae 97685->98843 97689 74ee67 GetOpenFileNameW 97686->97689 97690 74eeb6 97689->97690 97692 717d2c 59 API calls 97690->97692 97694 74eecb 97692->97694 97694->97694 97696 717429 98871 7169ca 97696->98871 97700 717da5 97699->97700 97701 717d38 __NMSG_WRITE 97699->97701 97702 717e8c 59 API calls 97700->97702 97703 717d73 97701->97703 97704 717d4e 97701->97704 97707 717d56 _memmove 97702->97707 97706 718189 59 API calls 97703->97706 97705 718087 59 API calls 97704->97705 97705->97707 97706->97707 97707->97561 97709 720a9a __write_nolock 97708->97709 97821->97557 97853 730ffe 97850->97853 97852 731018 97852->97599 97853->97852 97855 73101c std::exception::exception 97853->97855 97860 73594c 97853->97860 97877 7335e1 DecodePointer 97853->97877 97878 7387db RaiseException 97855->97878 97857 731046 97879 738711 58 API calls _free 97857->97879 97859 731058 97859->97599 97861 7359c7 97860->97861 97864 735958 97860->97864 97886 7335e1 DecodePointer 97861->97886 97863 7359cd 97887 738d68 58 API calls __getptd_noexit 97863->97887 97867 73598b RtlAllocateHeap 97864->97867 97869 735963 97864->97869 97871 7359b3 97864->97871 97875 7359b1 97864->97875 97883 7335e1 DecodePointer 97864->97883 97867->97864 97868 7359bf 97867->97868 97868->97853 97869->97864 97880 73a3ab 58 API calls __NMSG_WRITE 97869->97880 97881 73a408 58 API calls 5 library calls 97869->97881 97882 7332df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97869->97882 97884 738d68 58 API calls __getptd_noexit 97871->97884 97885 738d68 58 API calls __getptd_noexit 97875->97885 97877->97853 97878->97857 97879->97859 97880->97869 97881->97869 97883->97864 97884->97875 97885->97868 97886->97863 97887->97868 97889 713d50 __write_nolock 97888->97889 97890 717d2c 59 API calls 97889->97890 97895 713eb6 Mailbox 97889->97895 97892 713d82 97890->97892 97898 713db8 Mailbox 97892->97898 98014 717b52 97892->98014 97893 713e89 97894 717f41 59 API calls 97893->97894 97893->97895 97897 713eaa 97894->97897 97895->97606 97896 717f41 59 API calls 97896->97898 97899 713f84 59 API calls 97897->97899 97898->97893 97898->97895 97898->97896 97901 717b52 59 API calls 97898->97901 98017 713f84 97898->98017 97899->97895 97901->97898 98027 714d13 97902->98027 97907 714f68 LoadLibraryExW 98037 714cc8 97907->98037 97908 74dd0f 97909 714faa 84 API calls 97908->97909 97912 74dd16 97909->97912 97914 714cc8 3 API calls 97912->97914 97916 74dd1e 97914->97916 97915 714f8f 97915->97916 97917 714f9b 97915->97917 98063 71506b 97916->98063 97918 714faa 84 API calls 97917->97918 97920 7137e6 97918->97920 97920->97613 97920->97614 97923 74dd45 98071 715027 97923->98071 97925 74dd52 97927 7181b2 97926->97927 97928 713801 97926->97928 98501 7180d7 59 API calls 2 library calls 97927->98501 97930 7193ea 97928->97930 97931 730ff6 Mailbox 59 API calls 97930->97931 97932 71380d 97931->97932 97932->97627 97934 71862b 97933->97934 97936 718652 97934->97936 98502 718b13 69 API calls Mailbox 97934->98502 97936->97630 97938 713f05 97937->97938 97939 713eec 97937->97939 97941 717d2c 59 API calls 97938->97941 97940 7181a7 59 API calls 97939->97940 97942 71388b 97940->97942 97941->97942 97943 73313d 97942->97943 97944 733149 97943->97944 97945 7331be 97943->97945 97952 73316e 97944->97952 98503 738d68 58 API calls __getptd_noexit 97944->98503 98505 7331d0 60 API calls 4 library calls 97945->98505 97948 7331cb 97948->97652 97949 733155 98504 738ff6 9 API calls __wsopen_nolock 97949->98504 97951 733160 97951->97652 97952->97652 97954 719436 97953->97954 97955 730ff6 Mailbox 59 API calls 97954->97955 97956 719444 97955->97956 97957 713936 97956->97957 98506 71935c 59 API calls Mailbox 97956->98506 97959 7191b0 97957->97959 98507 7192c0 97959->98507 97961 7191bf 97962 730ff6 Mailbox 59 API calls 97961->97962 97963 713944 97961->97963 97962->97963 97964 719040 97963->97964 97965 74f5a5 97964->97965 97967 719057 97964->97967 97965->97967 98517 718d3b 59 API calls Mailbox 97965->98517 97968 7191a0 97967->97968 97969 719158 97967->97969 97972 71915f 97967->97972 98516 719e9c 60 API calls Mailbox 97968->98516 97971 730ff6 Mailbox 59 API calls 97969->97971 97971->97972 97972->97680 97974 715045 85 API calls 97973->97974 97975 779854 97974->97975 98518 7799be 97975->98518 97978 71506b 74 API calls 97979 779881 97978->97979 97980 71506b 74 API calls 97979->97980 97981 779891 97980->97981 97982 71506b 74 API calls 97981->97982 97983 7798ac 97982->97983 97984 71506b 74 API calls 97983->97984 97985 7798c7 97984->97985 97986 715045 85 API calls 97985->97986 97987 7798de 97986->97987 97988 73594c __crtCompareStringA_stat 58 API calls 97987->97988 97989 7798e5 97988->97989 97990 73594c __crtCompareStringA_stat 58 API calls 97989->97990 97991 7798ef 97990->97991 97992 71506b 74 API calls 97991->97992 97993 779903 97992->97993 97994 779393 GetSystemTimeAsFileTime 97993->97994 97995 779916 97994->97995 97996 779940 97995->97996 97997 77992b 97995->97997 97998 779946 97996->97998 97999 7799a5 97996->97999 98000 732f95 _free 58 API calls 97997->98000 98524 778d90 97998->98524 98002 732f95 _free 58 API calls 97999->98002 98003 779931 98000->98003 98005 74d3c1 98002->98005 98006 732f95 _free 58 API calls 98003->98006 98005->97617 98008 714faa 98005->98008 98006->98005 98007 732f95 _free 58 API calls 98007->98005 98009 714fb4 98008->98009 98013 714fbb 98008->98013 98010 7355d6 __fcloseall 83 API calls 98009->98010 98010->98013 98011 714fdb FreeLibrary 98012 714fca 98011->98012 98012->97617 98013->98011 98013->98012 98023 717faf 98014->98023 98016 717b5d 98016->97892 98018 713f92 98017->98018 98022 713fb4 _memmove 98017->98022 98020 730ff6 Mailbox 59 API calls 98018->98020 98019 730ff6 Mailbox 59 API calls 98021 713fc8 98019->98021 98020->98022 98021->97898 98022->98019 98024 717fc2 98023->98024 98026 717fbf _memmove 98023->98026 98025 730ff6 Mailbox 59 API calls 98024->98025 98025->98026 98026->98016 98076 714d61 98027->98076 98030 714d3a 98031 714d53 98030->98031 98032 714d4a FreeLibrary 98030->98032 98034 73548b 98031->98034 98032->98031 98033 714d61 2 API calls 98033->98030 98080 7354a0 98034->98080 98036 714f5c 98036->97907 98036->97908 98238 714d94 98037->98238 98040 714ced 98042 714d08 98040->98042 98043 714cff FreeLibrary 98040->98043 98041 714d94 2 API calls 98041->98040 98044 714dd0 98042->98044 98043->98042 98045 730ff6 Mailbox 59 API calls 98044->98045 98046 714de5 98045->98046 98242 71538e 98046->98242 98048 714df1 _memmove 98049 714e2c 98048->98049 98051 714f21 98048->98051 98052 714ee9 98048->98052 98050 715027 69 API calls 98049->98050 98055 714e35 98050->98055 98256 779ba5 95 API calls 98051->98256 98245 714fe9 CreateStreamOnHGlobal 98052->98245 98056 71506b 74 API calls 98055->98056 98057 714ec9 98055->98057 98059 74dcd0 98055->98059 98251 715045 98055->98251 98056->98055 98057->97915 98060 715045 85 API calls 98059->98060 98061 74dce4 98060->98061 98062 71506b 74 API calls 98061->98062 98062->98057 98064 74ddf6 98063->98064 98065 71507d 98063->98065 98280 735812 98065->98280 98068 779393 98478 7791e9 98068->98478 98070 7793a9 98070->97923 98072 715036 98071->98072 98073 74ddb9 98071->98073 98483 735e90 98072->98483 98075 71503e 98075->97925 98077 714d2e 98076->98077 98078 714d6a LoadLibraryA 98076->98078 98077->98030 98077->98033 98078->98077 98079 714d7b GetProcAddress 98078->98079 98079->98077 98081 7354ac _raise 98080->98081 98082 7354bf 98081->98082 98085 7354f0 98081->98085 98129 738d68 58 API calls __getptd_noexit 98082->98129 98084 7354c4 98130 738ff6 9 API calls __wsopen_nolock 98084->98130 98099 740738 98085->98099 98088 7354f5 98089 73550b 98088->98089 98090 7354fe 98088->98090 98092 735535 98089->98092 98093 735515 98089->98093 98131 738d68 58 API calls __getptd_noexit 98090->98131 98114 740857 98092->98114 98132 738d68 58 API calls __getptd_noexit 98093->98132 98095 7354cf _raise @_EH4_CallFilterFunc@8 98095->98036 98100 740744 _raise 98099->98100 98101 739e4b __lock 58 API calls 98100->98101 98108 740752 98101->98108 98102 7407c6 98134 74084e 98102->98134 98103 7407cd 98139 738a5d 58 API calls 2 library calls 98103->98139 98106 740843 _raise 98106->98088 98107 7407d4 98107->98102 98140 73a06b InitializeCriticalSectionAndSpinCount 98107->98140 98108->98102 98108->98103 98111 739ed3 __mtinitlocknum 58 API calls 98108->98111 98137 736e8d 59 API calls __lock 98108->98137 98138 736ef7 LeaveCriticalSection LeaveCriticalSection _doexit 98108->98138 98111->98108 98112 7407fa EnterCriticalSection 98112->98102 98115 740877 __wopenfile 98114->98115 98116 740891 98115->98116 98125 740a4c 98115->98125 98147 733a0b 60 API calls 3 library calls 98115->98147 98145 738d68 58 API calls __getptd_noexit 98116->98145 98118 740896 98146 738ff6 9 API calls __wsopen_nolock 98118->98146 98120 740aaf 98142 7487f1 98120->98142 98121 735540 98133 735562 LeaveCriticalSection LeaveCriticalSection __wfsopen 98121->98133 98124 740a45 98124->98125 98148 733a0b 60 API calls 3 library calls 98124->98148 98125->98116 98125->98120 98127 740a64 98127->98125 98149 733a0b 60 API calls 3 library calls 98127->98149 98129->98084 98130->98095 98131->98095 98132->98095 98133->98095 98141 739fb5 LeaveCriticalSection 98134->98141 98136 740855 98136->98106 98137->98108 98138->98108 98139->98107 98140->98112 98141->98136 98150 747fd5 98142->98150 98144 74880a 98144->98121 98145->98118 98146->98121 98147->98124 98148->98127 98149->98125 98151 747fe1 _raise 98150->98151 98152 747ff7 98151->98152 98154 74802d 98151->98154 98235 738d68 58 API calls __getptd_noexit 98152->98235 98161 74809e 98154->98161 98155 747ffc 98236 738ff6 9 API calls __wsopen_nolock 98155->98236 98158 748049 98237 748072 LeaveCriticalSection __unlock_fhandle 98158->98237 98160 748006 _raise 98160->98144 98162 7480be 98161->98162 98163 73471a __wsopen_nolock 58 API calls 98162->98163 98166 7480da 98163->98166 98164 739006 __invoke_watson 8 API calls 98165 7487f0 98164->98165 98168 747fd5 __wsopen_helper 103 API calls 98165->98168 98167 748114 98166->98167 98175 748137 98166->98175 98184 748211 98166->98184 98169 738d34 __wsopen_nolock 58 API calls 98167->98169 98170 74880a 98168->98170 98171 748119 98169->98171 98170->98158 98172 738d68 _free 58 API calls 98171->98172 98173 748126 98172->98173 98176 738ff6 __wsopen_nolock 9 API calls 98173->98176 98174 7481f5 98177 738d34 __wsopen_nolock 58 API calls 98174->98177 98175->98174 98183 7481d3 98175->98183 98178 748130 98176->98178 98179 7481fa 98177->98179 98178->98158 98180 738d68 _free 58 API calls 98179->98180 98181 748207 98180->98181 98182 738ff6 __wsopen_nolock 9 API calls 98181->98182 98182->98184 98185 73d4d4 __alloc_osfhnd 61 API calls 98183->98185 98184->98164 98186 7482a1 98185->98186 98187 7482ce 98186->98187 98188 7482ab 98186->98188 98189 747f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98187->98189 98190 738d34 __wsopen_nolock 58 API calls 98188->98190 98198 7482f0 98189->98198 98191 7482b0 98190->98191 98193 738d68 _free 58 API calls 98191->98193 98192 74836e GetFileType 98196 748379 GetLastError 98192->98196 98197 7483bb 98192->98197 98195 7482ba 98193->98195 98194 74833c GetLastError 98199 738d47 __dosmaperr 58 API calls 98194->98199 98200 738d68 _free 58 API calls 98195->98200 98201 738d47 __dosmaperr 58 API calls 98196->98201 98207 73d76a __set_osfhnd 59 API calls 98197->98207 98198->98192 98198->98194 98203 747f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98198->98203 98204 748361 98199->98204 98200->98178 98202 7483a0 CloseHandle 98201->98202 98202->98204 98205 7483ae 98202->98205 98206 748331 98203->98206 98209 738d68 _free 58 API calls 98204->98209 98208 738d68 _free 58 API calls 98205->98208 98206->98192 98206->98194 98212 7483d9 98207->98212 98210 7483b3 98208->98210 98209->98184 98210->98204 98211 748594 98211->98184 98214 748767 CloseHandle 98211->98214 98212->98211 98213 741b11 __lseeki64_nolock 60 API calls 98212->98213 98229 74845a 98212->98229 98215 748443 98213->98215 98216 747f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98214->98216 98217 738d34 __wsopen_nolock 58 API calls 98215->98217 98215->98229 98219 74878e 98216->98219 98217->98229 98218 7410ab 70 API calls __read_nolock 98218->98229 98220 748796 GetLastError 98219->98220 98221 7487c2 98219->98221 98222 738d47 __dosmaperr 58 API calls 98220->98222 98221->98184 98223 7487a2 98222->98223 98226 73d67d __free_osfhnd 59 API calls 98223->98226 98224 740d2d __close_nolock 61 API calls 98224->98229 98225 74848c 98227 7499f2 __chsize_nolock 82 API calls 98225->98227 98225->98229 98226->98221 98227->98225 98228 73dac6 __write 78 API calls 98228->98229 98229->98211 98229->98218 98229->98224 98229->98225 98229->98228 98230 748611 98229->98230 98232 741b11 60 API calls __lseeki64_nolock 98229->98232 98231 740d2d __close_nolock 61 API calls 98230->98231 98233 748618 98231->98233 98232->98229 98234 738d68 _free 58 API calls 98233->98234 98234->98184 98235->98155 98236->98160 98237->98160 98239 714ce1 98238->98239 98240 714d9d LoadLibraryA 98238->98240 98239->98040 98239->98041 98240->98239 98241 714dae GetProcAddress 98240->98241 98241->98239 98243 730ff6 Mailbox 59 API calls 98242->98243 98244 7153a0 98243->98244 98244->98048 98246 715003 FindResourceExW 98245->98246 98250 715020 98245->98250 98247 74dd5c LoadResource 98246->98247 98246->98250 98248 74dd71 SizeofResource 98247->98248 98247->98250 98249 74dd85 LockResource 98248->98249 98248->98250 98249->98250 98250->98049 98252 74ddd4 98251->98252 98253 715054 98251->98253 98257 735a7d 98253->98257 98255 715062 98255->98055 98256->98049 98258 735a89 _raise 98257->98258 98259 735a9b 98258->98259 98261 735ac1 98258->98261 98270 738d68 58 API calls __getptd_noexit 98259->98270 98272 736e4e 98261->98272 98262 735aa0 98271 738ff6 9 API calls __wsopen_nolock 98262->98271 98265 735ac7 98278 7359ee 83 API calls 5 library calls 98265->98278 98267 735ad6 98279 735af8 LeaveCriticalSection LeaveCriticalSection __wfsopen 98267->98279 98269 735aab _raise 98269->98255 98270->98262 98271->98269 98273 736e80 EnterCriticalSection 98272->98273 98274 736e5e 98272->98274 98276 736e76 98273->98276 98274->98273 98275 736e66 98274->98275 98277 739e4b __lock 58 API calls 98275->98277 98276->98265 98277->98276 98278->98267 98279->98269 98283 73582d 98280->98283 98282 71508e 98282->98068 98284 735839 _raise 98283->98284 98285 73587c 98284->98285 98286 735874 _raise 98284->98286 98291 73584f _memset 98284->98291 98287 736e4e __lock_file 59 API calls 98285->98287 98286->98282 98289 735882 98287->98289 98296 73564d 98289->98296 98310 738d68 58 API calls __getptd_noexit 98291->98310 98292 735869 98311 738ff6 9 API calls __wsopen_nolock 98292->98311 98300 735668 _memset 98296->98300 98303 735683 98296->98303 98297 735673 98408 738d68 58 API calls __getptd_noexit 98297->98408 98299 735678 98409 738ff6 9 API calls __wsopen_nolock 98299->98409 98300->98297 98300->98303 98307 7356c3 98300->98307 98312 7358b6 LeaveCriticalSection LeaveCriticalSection __wfsopen 98303->98312 98304 7357d4 _memset 98411 738d68 58 API calls __getptd_noexit 98304->98411 98307->98303 98307->98304 98313 734916 98307->98313 98320 7410ab 98307->98320 98388 740df7 98307->98388 98410 740f18 58 API calls 4 library calls 98307->98410 98310->98292 98311->98286 98312->98286 98314 734920 98313->98314 98315 734935 98313->98315 98412 738d68 58 API calls __getptd_noexit 98314->98412 98315->98307 98317 734925 98413 738ff6 9 API calls __wsopen_nolock 98317->98413 98319 734930 98319->98307 98321 7410e3 98320->98321 98322 7410cc 98320->98322 98324 74181b 98321->98324 98329 74111d 98321->98329 98423 738d34 58 API calls __getptd_noexit 98322->98423 98439 738d34 58 API calls __getptd_noexit 98324->98439 98326 7410d1 98424 738d68 58 API calls __getptd_noexit 98326->98424 98327 741820 98440 738d68 58 API calls __getptd_noexit 98327->98440 98331 741125 98329->98331 98337 74113c 98329->98337 98425 738d34 58 API calls __getptd_noexit 98331->98425 98333 741131 98441 738ff6 9 API calls __wsopen_nolock 98333->98441 98334 74112a 98426 738d68 58 API calls __getptd_noexit 98334->98426 98336 741151 98427 738d34 58 API calls __getptd_noexit 98336->98427 98337->98336 98340 74116b 98337->98340 98341 741189 98337->98341 98368 7410d8 98337->98368 98340->98336 98343 741176 98340->98343 98428 738a5d 58 API calls 2 library calls 98341->98428 98414 745ebb 98343->98414 98344 741199 98346 7411a1 98344->98346 98347 7411bc 98344->98347 98429 738d68 58 API calls __getptd_noexit 98346->98429 98431 741b11 60 API calls 3 library calls 98347->98431 98348 74128a 98350 741303 ReadFile 98348->98350 98355 7412a0 GetConsoleMode 98348->98355 98353 741325 98350->98353 98354 7417e3 GetLastError 98350->98354 98352 7411a6 98430 738d34 58 API calls __getptd_noexit 98352->98430 98353->98354 98361 7412f5 98353->98361 98357 7412e3 98354->98357 98358 7417f0 98354->98358 98359 7412b4 98355->98359 98360 741300 98355->98360 98370 7412e9 98357->98370 98432 738d47 58 API calls 2 library calls 98357->98432 98437 738d68 58 API calls __getptd_noexit 98358->98437 98359->98360 98363 7412ba ReadConsoleW 98359->98363 98360->98350 98361->98370 98371 74135a 98361->98371 98372 7415c7 98361->98372 98363->98361 98366 7412dd GetLastError 98363->98366 98365 7417f5 98438 738d34 58 API calls __getptd_noexit 98365->98438 98366->98357 98368->98307 98369 732f95 _free 58 API calls 98369->98368 98370->98368 98370->98369 98374 7413c6 ReadFile 98371->98374 98380 741447 98371->98380 98372->98370 98378 7416cd ReadFile 98372->98378 98375 7413e7 GetLastError 98374->98375 98384 7413f1 98374->98384 98375->98384 98376 741504 98382 7414b4 MultiByteToWideChar 98376->98382 98435 741b11 60 API calls 3 library calls 98376->98435 98377 7414f4 98434 738d68 58 API calls __getptd_noexit 98377->98434 98379 7416f0 GetLastError 98378->98379 98387 7416fe 98378->98387 98379->98387 98380->98370 98380->98376 98380->98377 98380->98382 98382->98366 98382->98370 98384->98371 98433 741b11 60 API calls 3 library calls 98384->98433 98387->98372 98436 741b11 60 API calls 3 library calls 98387->98436 98389 740e02 98388->98389 98392 740e17 98388->98392 98475 738d68 58 API calls __getptd_noexit 98389->98475 98391 740e07 98476 738ff6 9 API calls __wsopen_nolock 98391->98476 98394 740e4c 98392->98394 98402 740e12 98392->98402 98477 746234 58 API calls __malloc_crt 98392->98477 98396 734916 __stbuf 58 API calls 98394->98396 98397 740e60 98396->98397 98442 740f97 98397->98442 98399 740e67 98400 734916 __stbuf 58 API calls 98399->98400 98399->98402 98401 740e8a 98400->98401 98401->98402 98403 734916 __stbuf 58 API calls 98401->98403 98402->98307 98404 740e96 98403->98404 98404->98402 98405 734916 __stbuf 58 API calls 98404->98405 98406 740ea3 98405->98406 98407 734916 __stbuf 58 API calls 98406->98407 98407->98402 98408->98299 98409->98303 98410->98307 98411->98299 98412->98317 98413->98319 98415 745ec6 98414->98415 98416 745ed3 98414->98416 98417 738d68 _free 58 API calls 98415->98417 98419 745edf 98416->98419 98420 738d68 _free 58 API calls 98416->98420 98418 745ecb 98417->98418 98418->98348 98419->98348 98421 745f00 98420->98421 98422 738ff6 __wsopen_nolock 9 API calls 98421->98422 98422->98418 98423->98326 98424->98368 98425->98334 98426->98333 98427->98334 98428->98344 98429->98352 98430->98368 98431->98343 98432->98370 98433->98384 98434->98370 98435->98382 98436->98387 98437->98365 98438->98370 98439->98327 98440->98333 98441->98368 98443 740fa3 _raise 98442->98443 98444 740fc7 98443->98444 98445 740fb0 98443->98445 98447 74108b 98444->98447 98450 740fdb 98444->98450 98446 738d34 __wsopen_nolock 58 API calls 98445->98446 98449 740fb5 98446->98449 98448 738d34 __wsopen_nolock 58 API calls 98447->98448 98456 740ffe 98448->98456 98451 738d68 _free 58 API calls 98449->98451 98452 741006 98450->98452 98453 740ff9 98450->98453 98467 740fbc _raise 98451->98467 98454 741013 98452->98454 98455 741028 98452->98455 98457 738d34 __wsopen_nolock 58 API calls 98453->98457 98458 738d34 __wsopen_nolock 58 API calls 98454->98458 98459 73d446 ___lock_fhandle 59 API calls 98455->98459 98460 738d68 _free 58 API calls 98456->98460 98457->98456 98461 741018 98458->98461 98462 74102e 98459->98462 98463 741020 98460->98463 98464 738d68 _free 58 API calls 98461->98464 98465 741054 98462->98465 98466 741041 98462->98466 98469 738ff6 __wsopen_nolock 9 API calls 98463->98469 98464->98463 98470 738d68 _free 58 API calls 98465->98470 98468 7410ab __read_nolock 70 API calls 98466->98468 98467->98399 98471 74104d 98468->98471 98469->98467 98472 741059 98470->98472 98474 741083 __read LeaveCriticalSection 98471->98474 98473 738d34 __wsopen_nolock 58 API calls 98472->98473 98473->98471 98474->98467 98475->98391 98476->98402 98477->98394 98481 73543a GetSystemTimeAsFileTime 98478->98481 98480 7791f8 98480->98070 98482 735468 __aulldiv 98481->98482 98482->98480 98484 735e9c _raise 98483->98484 98485 735ec3 98484->98485 98486 735eae 98484->98486 98488 736e4e __lock_file 59 API calls 98485->98488 98497 738d68 58 API calls __getptd_noexit 98486->98497 98490 735ec9 98488->98490 98489 735eb3 98498 738ff6 9 API calls __wsopen_nolock 98489->98498 98499 735b00 67 API calls 7 library calls 98490->98499 98493 735ed4 98500 735ef4 LeaveCriticalSection LeaveCriticalSection __wfsopen 98493->98500 98495 735ee6 98496 735ebe _raise 98495->98496 98496->98075 98497->98489 98498->98496 98499->98493 98500->98495 98501->97928 98502->97936 98503->97949 98504->97951 98505->97948 98506->97957 98508 7192c9 Mailbox 98507->98508 98509 74f5c8 98508->98509 98514 7192d3 98508->98514 98511 730ff6 Mailbox 59 API calls 98509->98511 98510 7192da 98510->97961 98512 74f5d4 98511->98512 98514->98510 98515 719df0 59 API calls Mailbox 98514->98515 98515->98514 98516->97972 98517->97967 98522 7799d2 __tzset_nolock _wcscmp 98518->98522 98519 779393 GetSystemTimeAsFileTime 98519->98522 98520 779866 98520->97978 98520->98005 98521 71506b 74 API calls 98521->98522 98522->98519 98522->98520 98522->98521 98523 715045 85 API calls 98522->98523 98523->98522 98525 778d9b 98524->98525 98526 778da9 98524->98526 98527 73548b 115 API calls 98525->98527 98528 778dee 98526->98528 98529 73548b 115 API calls 98526->98529 98554 778db2 98526->98554 98527->98526 98555 77901b 98528->98555 98530 778dd3 98529->98530 98530->98528 98532 778ddc 98530->98532 98537 7355d6 __fcloseall 83 API calls 98532->98537 98532->98554 98533 778e32 98534 778e57 98533->98534 98535 778e36 98533->98535 98559 778c33 98534->98559 98536 778e43 98535->98536 98539 7355d6 __fcloseall 83 API calls 98535->98539 98541 7355d6 __fcloseall 83 API calls 98536->98541 98536->98554 98537->98554 98539->98536 98541->98554 98542 778e85 98568 778eb5 98542->98568 98543 778e65 98545 778e72 98543->98545 98547 7355d6 __fcloseall 83 API calls 98543->98547 98548 7355d6 __fcloseall 83 API calls 98545->98548 98545->98554 98547->98545 98548->98554 98551 778ea0 98553 7355d6 __fcloseall 83 API calls 98551->98553 98551->98554 98553->98554 98554->98007 98556 779040 98555->98556 98558 779029 __tzset_nolock _memmove 98555->98558 98557 735812 __fread_nolock 74 API calls 98556->98557 98557->98558 98558->98533 98560 73594c __crtCompareStringA_stat 58 API calls 98559->98560 98561 778c42 98560->98561 98562 73594c __crtCompareStringA_stat 58 API calls 98561->98562 98563 778c56 98562->98563 98564 73594c __crtCompareStringA_stat 58 API calls 98563->98564 98565 778c6a 98564->98565 98566 778f97 58 API calls 98565->98566 98567 778c7d 98565->98567 98566->98567 98567->98542 98567->98543 98572 778eca 98568->98572 98569 778f82 98601 7791bf 98569->98601 98570 778c8f 74 API calls 98570->98572 98572->98569 98572->98570 98575 778e8c 98572->98575 98597 77909c 98572->98597 98605 778d2b 74 API calls 98572->98605 98576 778f97 98575->98576 98577 778fa4 98576->98577 98578 778faa 98576->98578 98579 732f95 _free 58 API calls 98577->98579 98580 778fbb 98578->98580 98581 732f95 _free 58 API calls 98578->98581 98579->98578 98582 778e93 98580->98582 98583 732f95 _free 58 API calls 98580->98583 98581->98580 98582->98551 98584 7355d6 98582->98584 98583->98582 98585 7355e2 _raise 98584->98585 98586 7355f6 98585->98586 98587 73560e 98585->98587 98654 738d68 58 API calls __getptd_noexit 98586->98654 98589 736e4e __lock_file 59 API calls 98587->98589 98594 735606 _raise 98587->98594 98591 735620 98589->98591 98590 7355fb 98655 738ff6 9 API calls __wsopen_nolock 98590->98655 98638 73556a 98591->98638 98594->98551 98598 7790eb 98597->98598 98599 7790ab 98597->98599 98598->98599 98606 779172 98598->98606 98599->98572 98599->98599 98602 7791dd 98601->98602 98603 7791cc 98601->98603 98602->98575 98604 734a93 80 API calls 98603->98604 98604->98602 98605->98572 98607 77919e 98606->98607 98608 7791af 98606->98608 98610 734a93 98607->98610 98608->98598 98611 734a9f _raise 98610->98611 98612 734ad5 98611->98612 98613 734abd 98611->98613 98616 734acd _raise 98611->98616 98614 736e4e __lock_file 59 API calls 98612->98614 98635 738d68 58 API calls __getptd_noexit 98613->98635 98617 734adb 98614->98617 98616->98608 98623 73493a 98617->98623 98618 734ac2 98636 738ff6 9 API calls __wsopen_nolock 98618->98636 98626 734949 98623->98626 98629 734967 98623->98629 98624 734957 98625 738d68 _free 58 API calls 98624->98625 98627 73495c 98625->98627 98626->98624 98626->98629 98633 734981 _memmove 98626->98633 98628 738ff6 __wsopen_nolock 9 API calls 98627->98628 98628->98629 98637 734b0d LeaveCriticalSection LeaveCriticalSection __wfsopen 98629->98637 98630 73b05e __flsbuf 78 API calls 98630->98633 98631 734c6d __flush 78 API calls 98631->98633 98632 734916 __stbuf 58 API calls 98632->98633 98633->98629 98633->98630 98633->98631 98633->98632 98634 73dac6 __write 78 API calls 98633->98634 98634->98633 98635->98618 98636->98616 98637->98616 98639 735579 98638->98639 98640 73558d 98638->98640 98693 738d68 58 API calls __getptd_noexit 98639->98693 98642 735589 98640->98642 98657 734c6d 98640->98657 98656 735645 LeaveCriticalSection LeaveCriticalSection __wfsopen 98642->98656 98643 73557e 98694 738ff6 9 API calls __wsopen_nolock 98643->98694 98649 734916 __stbuf 58 API calls 98650 7355a7 98649->98650 98667 740c52 98650->98667 98652 7355ad 98652->98642 98653 732f95 _free 58 API calls 98652->98653 98653->98642 98654->98590 98655->98594 98656->98594 98658 734c80 98657->98658 98662 734ca4 98657->98662 98659 734916 __stbuf 58 API calls 98658->98659 98658->98662 98660 734c9d 98659->98660 98695 73dac6 98660->98695 98663 740dc7 98662->98663 98664 7355a1 98663->98664 98665 740dd4 98663->98665 98664->98649 98665->98664 98666 732f95 _free 58 API calls 98665->98666 98666->98664 98668 740c5e _raise 98667->98668 98669 740c82 98668->98669 98670 740c6b 98668->98670 98671 740d0d 98669->98671 98673 740c92 98669->98673 98820 738d34 58 API calls __getptd_noexit 98670->98820 98825 738d34 58 API calls __getptd_noexit 98671->98825 98677 740cb0 98673->98677 98678 740cba 98673->98678 98675 740c70 98821 738d68 58 API calls __getptd_noexit 98675->98821 98822 738d34 58 API calls __getptd_noexit 98677->98822 98681 73d446 ___lock_fhandle 59 API calls 98678->98681 98679 740cb5 98826 738d68 58 API calls __getptd_noexit 98679->98826 98683 740cc0 98681->98683 98685 740cd3 98683->98685 98686 740cde 98683->98686 98684 740d19 98827 738ff6 9 API calls __wsopen_nolock 98684->98827 98805 740d2d 98685->98805 98823 738d68 58 API calls __getptd_noexit 98686->98823 98689 740c77 _raise 98689->98652 98691 740cd9 98824 740d05 LeaveCriticalSection __unlock_fhandle 98691->98824 98693->98643 98694->98642 98696 73dad2 _raise 98695->98696 98697 73daf6 98696->98697 98698 73dadf 98696->98698 98700 73db95 98697->98700 98702 73db0a 98697->98702 98796 738d34 58 API calls __getptd_noexit 98698->98796 98802 738d34 58 API calls __getptd_noexit 98700->98802 98701 73dae4 98797 738d68 58 API calls __getptd_noexit 98701->98797 98705 73db32 98702->98705 98706 73db28 98702->98706 98723 73d446 98705->98723 98798 738d34 58 API calls __getptd_noexit 98706->98798 98707 73db2d 98803 738d68 58 API calls __getptd_noexit 98707->98803 98708 73daeb _raise 98708->98662 98711 73db38 98713 73db4b 98711->98713 98714 73db5e 98711->98714 98732 73dbb5 98713->98732 98799 738d68 58 API calls __getptd_noexit 98714->98799 98715 73dba1 98804 738ff6 9 API calls __wsopen_nolock 98715->98804 98719 73db57 98801 73db8d LeaveCriticalSection __unlock_fhandle 98719->98801 98720 73db63 98800 738d34 58 API calls __getptd_noexit 98720->98800 98724 73d452 _raise 98723->98724 98725 73d4a1 EnterCriticalSection 98724->98725 98726 739e4b __lock 58 API calls 98724->98726 98727 73d4c7 _raise 98725->98727 98728 73d477 98726->98728 98727->98711 98729 73d48f 98728->98729 98730 73a06b ___lock_fhandle InitializeCriticalSectionAndSpinCount 98728->98730 98731 73d4cb ___lock_fhandle LeaveCriticalSection 98729->98731 98730->98729 98731->98725 98733 73dbc2 __write_nolock 98732->98733 98734 73dc01 98733->98734 98735 73dc20 98733->98735 98766 73dbf6 98733->98766 98737 738d34 __wsopen_nolock 58 API calls 98734->98737 98740 73dc78 98735->98740 98741 73dc5c 98735->98741 98736 73c836 __87except 6 API calls 98738 73e416 98736->98738 98739 73dc06 98737->98739 98738->98719 98743 738d68 _free 58 API calls 98739->98743 98744 73dc91 98740->98744 98747 741b11 __lseeki64_nolock 60 API calls 98740->98747 98742 738d34 __wsopen_nolock 58 API calls 98741->98742 98745 73dc61 98742->98745 98746 73dc0d 98743->98746 98748 745ebb __stbuf 58 API calls 98744->98748 98749 738d68 _free 58 API calls 98745->98749 98750 738ff6 __wsopen_nolock 9 API calls 98746->98750 98747->98744 98751 73dc9f 98748->98751 98752 73dc68 98749->98752 98750->98766 98753 73dff8 98751->98753 98757 739bec __setmbcp 58 API calls 98751->98757 98756 738ff6 __wsopen_nolock 9 API calls 98752->98756 98754 73e016 98753->98754 98755 73e38b WriteFile 98753->98755 98758 73e13a 98754->98758 98764 73e02c 98754->98764 98759 73dfeb GetLastError 98755->98759 98768 73dfb8 98755->98768 98756->98766 98760 73dccb GetConsoleMode 98757->98760 98769 73e22f 98758->98769 98771 73e145 98758->98771 98759->98768 98760->98753 98762 73dd0a 98760->98762 98761 73e3c4 98761->98766 98767 738d68 _free 58 API calls 98761->98767 98762->98753 98763 73dd1a GetConsoleCP 98762->98763 98763->98761 98791 73dd49 98763->98791 98764->98761 98765 73e09b WriteFile 98764->98765 98765->98759 98770 73e0d8 98765->98770 98766->98736 98772 73e3f2 98767->98772 98768->98761 98768->98766 98773 73e118 98768->98773 98769->98761 98776 73e2a4 WideCharToMultiByte 98769->98776 98770->98764 98777 73e0fc 98770->98777 98771->98761 98778 73e1aa WriteFile 98771->98778 98779 738d34 __wsopen_nolock 58 API calls 98772->98779 98774 73e123 98773->98774 98775 73e3bb 98773->98775 98780 738d68 _free 58 API calls 98774->98780 98781 738d47 __dosmaperr 58 API calls 98775->98781 98776->98759 98789 73e2eb 98776->98789 98777->98768 98778->98759 98782 73e1f9 98778->98782 98779->98766 98783 73e128 98780->98783 98781->98766 98782->98768 98782->98771 98782->98777 98785 738d34 __wsopen_nolock 58 API calls 98783->98785 98784 73e2f3 WriteFile 98787 73e346 GetLastError 98784->98787 98784->98789 98785->98766 98786 733835 __write_nolock 58 API calls 98786->98791 98787->98789 98788 74650a 60 API calls __write_nolock 98788->98791 98789->98768 98789->98769 98789->98777 98789->98784 98790 747cae WriteConsoleW CreateFileW __putwch_nolock 98794 73de9f 98790->98794 98791->98768 98791->98786 98791->98788 98792 73de32 WideCharToMultiByte 98791->98792 98791->98794 98792->98768 98793 73de6d WriteFile 98792->98793 98793->98759 98793->98794 98794->98759 98794->98768 98794->98790 98794->98791 98795 73dec7 WriteFile 98794->98795 98795->98759 98795->98794 98796->98701 98797->98708 98798->98707 98799->98720 98800->98719 98801->98708 98802->98707 98803->98715 98804->98708 98828 73d703 98805->98828 98807 740d91 98841 73d67d 59 API calls 2 library calls 98807->98841 98809 740d3b 98809->98807 98812 73d703 __close_nolock 58 API calls 98809->98812 98819 740d6f 98809->98819 98810 73d703 __close_nolock 58 API calls 98813 740d7b FindCloseChangeNotification 98810->98813 98811 740d99 98818 740dbb 98811->98818 98842 738d47 58 API calls 2 library calls 98811->98842 98814 740d66 98812->98814 98813->98807 98816 740d87 GetLastError 98813->98816 98815 73d703 __close_nolock 58 API calls 98814->98815 98815->98819 98816->98807 98818->98691 98819->98807 98819->98810 98820->98675 98821->98689 98822->98679 98823->98691 98824->98689 98825->98679 98826->98684 98827->98689 98829 73d723 98828->98829 98830 73d70e 98828->98830 98833 738d34 __wsopen_nolock 58 API calls 98829->98833 98835 73d748 98829->98835 98831 738d34 __wsopen_nolock 58 API calls 98830->98831 98832 73d713 98831->98832 98834 738d68 _free 58 API calls 98832->98834 98836 73d752 98833->98836 98837 73d71b 98834->98837 98835->98809 98838 738d68 _free 58 API calls 98836->98838 98837->98809 98839 73d75a 98838->98839 98840 738ff6 __wsopen_nolock 9 API calls 98839->98840 98840->98837 98841->98811 98842->98818 98905 741b90 98843->98905 98846 7148f7 98911 717eec 98846->98911 98847 7148da 98848 717d2c 59 API calls 98847->98848 98850 7148e6 98848->98850 98907 717886 98850->98907 98853 7309d5 98854 741b90 __write_nolock 98853->98854 98855 7309e2 GetLongPathNameW 98854->98855 98856 717d2c 59 API calls 98855->98856 98857 71741d 98856->98857 98858 71716b 98857->98858 98859 7177c7 59 API calls 98858->98859 98860 71717d 98859->98860 98861 7148ae 60 API calls 98860->98861 98862 717188 98861->98862 98863 717193 98862->98863 98867 74ecae 98862->98867 98864 713f84 59 API calls 98863->98864 98866 71719f 98864->98866 98919 7134c2 98866->98919 98869 74ecc8 98867->98869 98925 717a68 61 API calls 98867->98925 98870 7171b2 Mailbox 98870->97696 98872 714f3d 136 API calls 98871->98872 98873 7169ef 98872->98873 98874 74e45a 98873->98874 98875 714f3d 136 API calls 98873->98875 98876 7797e5 122 API calls 98874->98876 98878 716a03 98875->98878 98877 74e46f 98876->98877 98879 74e490 98877->98879 98880 74e473 98877->98880 98878->98874 98881 716a0b 98878->98881 98883 730ff6 Mailbox 59 API calls 98879->98883 98882 714faa 84 API calls 98880->98882 98884 716a17 98881->98884 98885 74e47b 98881->98885 98882->98885 98904 74e4d5 Mailbox 98883->98904 98926 716bec 98884->98926 99033 774534 90 API calls _wprintf 98885->99033 98888 74e489 98888->98879 98890 74e689 98891 732f95 _free 58 API calls 98890->98891 98892 74e691 98891->98892 98893 714faa 84 API calls 98892->98893 98898 74e69a 98893->98898 98897 732f95 _free 58 API calls 98897->98898 98898->98897 98900 714faa 84 API calls 98898->98900 99037 76fcb1 89 API calls 4 library calls 98898->99037 98900->98898 98901 717f41 59 API calls 98901->98904 98904->98890 98904->98898 98904->98901 99019 71766f 98904->99019 99027 7174bd 98904->99027 99034 76fc4d 59 API calls 2 library calls 98904->99034 99035 76fb6e 61 API calls 2 library calls 98904->99035 99036 777621 59 API calls Mailbox 98904->99036 98906 7148bb GetFullPathNameW 98905->98906 98906->98846 98906->98847 98908 717894 98907->98908 98915 717e8c 98908->98915 98910 7148f2 98910->98853 98912 717f06 98911->98912 98914 717ef9 98911->98914 98913 730ff6 Mailbox 59 API calls 98912->98913 98913->98914 98914->98850 98916 717e9a 98915->98916 98918 717ea3 _memmove 98915->98918 98917 717faf 59 API calls 98916->98917 98916->98918 98917->98918 98918->98910 98920 7134d4 98919->98920 98924 7134f3 _memmove 98919->98924 98922 730ff6 Mailbox 59 API calls 98920->98922 98921 730ff6 Mailbox 59 API calls 98923 71350a 98921->98923 98922->98924 98923->98870 98924->98921 98925->98867 98927 74e847 98926->98927 98928 716c15 98926->98928 99129 76fcb1 89 API calls 4 library calls 98927->99129 99043 715906 60 API calls Mailbox 98928->99043 98931 74e85a 99130 76fcb1 89 API calls 4 library calls 98931->99130 98932 716c37 99044 715956 98932->99044 98936 716c54 98938 7177c7 59 API calls 98936->98938 98937 74e876 98968 716cc1 98937->98968 98939 716c60 98938->98939 99057 730b9b 60 API calls __write_nolock 98939->99057 98941 716c6c 98944 7177c7 59 API calls 98941->98944 98942 74e889 98945 715dcf CloseHandle 98942->98945 98943 716ccf 98946 7177c7 59 API calls 98943->98946 98947 716c78 98944->98947 98948 74e895 98945->98948 98949 716cd8 98946->98949 98950 7148ae 60 API calls 98947->98950 98951 714f3d 136 API calls 98948->98951 98952 7177c7 59 API calls 98949->98952 98953 716c86 98950->98953 98954 74e8b1 98951->98954 98955 716ce1 98952->98955 99058 7159b0 ReadFile SetFilePointerEx 98953->99058 98957 74e8da 98954->98957 98962 7797e5 122 API calls 98954->98962 99067 7146f9 98955->99067 99131 76fcb1 89 API calls 4 library calls 98957->99131 98961 716cb2 99059 715c4e 98961->99059 98966 74e8cd 98962->98966 98964 74e8f1 98997 716e6c Mailbox 98964->98997 98969 74e8d5 98966->98969 98970 74e8f6 98966->98970 98968->98942 98968->98943 98971 714faa 84 API calls 98969->98971 98972 714faa 84 API calls 98970->98972 98971->98957 98973 74e8fb 98972->98973 98974 730ff6 Mailbox 59 API calls 98973->98974 98981 74e92f 98974->98981 98978 713bcd 98978->97550 98978->97559 98982 71766f 59 API calls 98981->98982 99016 74e978 Mailbox 98982->99016 98984 74eb69 99136 777581 59 API calls Mailbox 98984->99136 98990 74eb8b 99137 77f835 59 API calls 2 library calls 98990->99137 98993 74eb98 98995 732f95 _free 58 API calls 98993->98995 98995->98997 99038 715934 98997->99038 98999 71766f 59 API calls 98999->99016 99009 717f41 59 API calls 99009->99016 99013 74ebbb 99138 76fcb1 89 API calls 4 library calls 99013->99138 99015 74ebd4 99017 732f95 _free 58 API calls 99015->99017 99016->98984 99016->98999 99016->99009 99016->99013 99132 76fc4d 59 API calls 2 library calls 99016->99132 99133 76fb6e 61 API calls 2 library calls 99016->99133 99134 777621 59 API calls Mailbox 99016->99134 99135 717373 59 API calls Mailbox 99016->99135 99018 74ebe7 99017->99018 99018->98997 99020 71770f 99019->99020 99024 717682 _memmove 99019->99024 99022 730ff6 Mailbox 59 API calls 99020->99022 99021 730ff6 Mailbox 59 API calls 99023 717689 99021->99023 99022->99024 99025 730ff6 Mailbox 59 API calls 99023->99025 99026 7176b2 99023->99026 99024->99021 99025->99026 99026->98904 99028 7174d0 99027->99028 99030 71757e 99027->99030 99029 730ff6 Mailbox 59 API calls 99028->99029 99032 717502 99028->99032 99029->99032 99030->98904 99031 730ff6 59 API calls Mailbox 99031->99032 99032->99030 99032->99031 99033->98888 99034->98904 99035->98904 99036->98904 99037->98898 99039 715dcf CloseHandle 99038->99039 99040 71593c Mailbox 99039->99040 99041 715dcf CloseHandle 99040->99041 99042 71594b 99041->99042 99042->98978 99043->98932 99045 715dcf CloseHandle 99044->99045 99046 715962 99045->99046 99141 715df9 99046->99141 99048 715981 99049 7159a4 99048->99049 99149 715770 99048->99149 99049->98931 99049->98936 99051 715993 99166 7153db SetFilePointerEx SetFilePointerEx 99051->99166 99053 74e030 99167 773696 SetFilePointerEx SetFilePointerEx WriteFile 99053->99167 99054 71599a 99054->99049 99054->99053 99056 74e060 99056->99049 99057->98941 99058->98961 99066 715c68 99059->99066 99060 74e151 99181 715dae SetFilePointerEx 99060->99181 99061 715cef SetFilePointerEx 99180 715dae SetFilePointerEx 99061->99180 99064 715cc3 99064->98968 99065 74e16b 99066->99060 99066->99061 99066->99064 99068 7177c7 59 API calls 99067->99068 99069 71470f 99068->99069 99070 7177c7 59 API calls 99069->99070 99071 714717 99070->99071 99072 7177c7 59 API calls 99071->99072 99073 71471f 99072->99073 99074 7177c7 59 API calls 99073->99074 99075 714727 99074->99075 99076 71475b 99075->99076 99077 74d8fb 99075->99077 99078 7179ab 59 API calls 99076->99078 99079 7181a7 59 API calls 99077->99079 99080 714769 99078->99080 99081 74d904 99079->99081 99082 717e8c 59 API calls 99080->99082 99083 717eec 59 API calls 99081->99083 99084 714773 99082->99084 99085 71479e 99083->99085 99084->99085 99086 7179ab 59 API calls 99084->99086 99089 7147bd 99085->99089 99098 74d924 99085->99098 99105 7147de 99085->99105 99088 714794 99086->99088 99092 717e8c 59 API calls 99088->99092 99090 717b52 59 API calls 99089->99090 99095 7147c7 99090->99095 99092->99085 99093 74d9f4 99094 717d2c 59 API calls 99093->99094 99113 74d9b1 99094->99113 99103 7179ab 59 API calls 99095->99103 99095->99105 99098->99093 99101 74d9dd 99098->99101 99112 74d95b 99098->99112 99101->99093 99108 74d9c8 99101->99108 99103->99105 99182 7179ab 99105->99182 99111 717d2c 59 API calls 99108->99111 99109 74d9b9 99110 717d2c 59 API calls 99109->99110 99110->99113 99111->99113 99112->99109 99116 74d9a4 99112->99116 99113->99105 99117 717d2c 59 API calls 99116->99117 99117->99113 99129->98931 99130->98937 99131->98964 99132->99016 99133->99016 99134->99016 99135->99016 99136->98990 99137->98993 99138->99015 99142 715e12 CreateFileW 99141->99142 99143 74e181 99141->99143 99145 715e34 99142->99145 99144 74e187 CreateFileW 99143->99144 99143->99145 99144->99145 99146 74e1ad 99144->99146 99145->99048 99147 715c4e 2 API calls 99146->99147 99148 74e1b8 99147->99148 99148->99145 99150 74dfce 99149->99150 99151 71578b 99149->99151 99165 71581a 99150->99165 99174 715e3f 99150->99174 99152 715c4e 2 API calls 99151->99152 99151->99165 99153 7157ad 99152->99153 99154 71538e 59 API calls 99153->99154 99156 7157b7 99154->99156 99156->99150 99157 7157c4 99156->99157 99158 730ff6 Mailbox 59 API calls 99157->99158 99159 7157cf 99158->99159 99160 71538e 59 API calls 99159->99160 99161 7157da 99160->99161 99168 715d20 99161->99168 99164 715c4e 2 API calls 99164->99165 99165->99051 99166->99054 99167->99056 99169 715d93 99168->99169 99172 715d2e 99168->99172 99179 715dae SetFilePointerEx 99169->99179 99171 715807 99171->99164 99172->99171 99173 715d66 ReadFile 99172->99173 99173->99171 99173->99172 99175 715c4e 2 API calls 99174->99175 99176 715e60 99175->99176 99177 715c4e 2 API calls 99176->99177 99178 715e74 99177->99178 99178->99165 99179->99172 99180->99064 99181->99065 99183 717a17 99182->99183 99184 7179ba 99182->99184 99184->99183 99186 7179c5 99184->99186 99719 713633 99720 71366a 99719->99720 99721 7136e7 99720->99721 99722 713688 99720->99722 99759 7136e5 99720->99759 99724 74d31c 99721->99724 99725 7136ed 99721->99725 99726 713695 99722->99726 99727 71375d PostQuitMessage 99722->99727 99723 7136ca DefWindowProcW 99761 7136d8 99723->99761 99769 7211d0 10 API calls Mailbox 99724->99769 99729 7136f2 99725->99729 99730 713715 SetTimer RegisterWindowMessageW 99725->99730 99731 7136a0 99726->99731 99732 74d38f 99726->99732 99727->99761 99735 7136f9 KillTimer 99729->99735 99736 74d2bf 99729->99736 99737 71373e CreatePopupMenu 99730->99737 99730->99761 99738 713767 99731->99738 99739 7136a8 99731->99739 99773 772a16 71 API calls _memset 99732->99773 99734 74d343 99770 7211f3 331 API calls Mailbox 99734->99770 99764 7144cb Shell_NotifyIconW _memset 99735->99764 99743 74d2c4 99736->99743 99744 74d2f8 MoveWindow 99736->99744 99737->99761 99767 714531 64 API calls _memset 99738->99767 99740 7136b3 99739->99740 99753 74d374 99739->99753 99746 71374b 99740->99746 99747 7136be 99740->99747 99750 74d2e7 SetFocus 99743->99750 99751 74d2c8 99743->99751 99744->99761 99766 7145df 81 API calls _memset 99746->99766 99747->99723 99771 7144cb Shell_NotifyIconW _memset 99747->99771 99748 74d3a1 99748->99723 99748->99761 99749 71375b 99749->99761 99750->99761 99751->99747 99755 74d2d1 99751->99755 99752 71370c 99765 713114 DeleteObject DestroyWindow Mailbox 99752->99765 99753->99723 99772 76817e 59 API calls Mailbox 99753->99772 99768 7211d0 10 API calls Mailbox 99755->99768 99759->99723 99762 74d368 99763 7143db 68 API calls 99762->99763 99763->99759 99764->99752 99765->99761 99766->99749 99767->99749 99768->99761 99769->99734 99770->99747 99771->99762 99772->99759 99773->99748 99774 74ff06 99775 74ff10 99774->99775 99814 71ac90 Mailbox _memmove 99774->99814 100024 718e34 59 API calls Mailbox 99775->100024 99779 730ff6 59 API calls Mailbox 99801 71a097 Mailbox 99779->99801 99782 71b5d5 99785 7181a7 59 API calls 99782->99785 99794 71a1b7 99785->99794 99786 75047f 100028 77a0b5 89 API calls 4 library calls 99786->100028 99787 71b5da 100034 77a0b5 89 API calls 4 library calls 99787->100034 99788 7181a7 59 API calls 99788->99801 99789 717f41 59 API calls 99789->99814 99791 7177c7 59 API calls 99791->99801 99793 75048e 99795 732f80 67 API calls __cinit 99795->99801 99797 767405 59 API calls 99797->99801 99798 7666f4 Mailbox 59 API calls 99798->99794 99799 750e00 100033 77a0b5 89 API calls 4 library calls 99799->100033 99801->99779 99801->99782 99801->99786 99801->99787 99801->99788 99801->99791 99801->99794 99801->99795 99801->99797 99801->99799 99803 71a6ba 99801->99803 100018 71ca20 331 API calls 2 library calls 99801->100018 100019 71ba60 60 API calls Mailbox 99801->100019 99802 78bf80 331 API calls 99802->99814 100032 77a0b5 89 API calls 4 library calls 99803->100032 99805 71b416 100023 71f803 331 API calls 99805->100023 99807 71a000 331 API calls 99807->99814 99808 750c94 100030 719df0 59 API calls Mailbox 99808->100030 99810 750ca2 100031 77a0b5 89 API calls 4 library calls 99810->100031 99812 750c86 99812->99794 99812->99798 99813 71b37c 100021 719e9c 60 API calls Mailbox 99813->100021 99814->99789 99814->99794 99814->99801 99814->99802 99814->99805 99814->99807 99814->99808 99814->99810 99814->99813 99816 730ff6 59 API calls Mailbox 99814->99816 99820 71b685 99814->99820 99823 71ade2 Mailbox 99814->99823 99977 78c5f4 99814->99977 100009 777be0 99814->100009 100015 7666f4 99814->100015 100025 767405 59 API calls 99814->100025 100026 78c4a7 85 API calls 2 library calls 99814->100026 99816->99814 99817 71b38d 100022 719e9c 60 API calls Mailbox 99817->100022 100029 77a0b5 89 API calls 4 library calls 99820->100029 99823->99794 99823->99812 99823->99820 99824 7500e0 VariantClear 99823->99824 99830 78474d 331 API calls 99823->99830 99832 78e237 99823->99832 99835 77d2e6 99823->99835 99882 77d2e5 99823->99882 99929 722123 99823->99929 99969 79251d 99823->99969 99974 78e24b 99823->99974 100020 719df0 59 API calls Mailbox 99823->100020 100027 767405 59 API calls 99823->100027 99824->99823 99830->99823 100035 78cdf1 99832->100035 99834 78e247 99834->99823 99836 77d305 99835->99836 99839 77d310 99835->99839 99837 719c9c 59 API calls 99836->99837 99837->99839 99838 730ff6 Mailbox 59 API calls 99840 77d433 99838->99840 99841 7177c7 59 API calls 99839->99841 99880 77d3ea Mailbox 99839->99880 99842 77d43f 99840->99842 100126 715906 60 API calls Mailbox 99840->100126 99843 77d334 99841->99843 99846 719997 84 API calls 99842->99846 99845 7177c7 59 API calls 99843->99845 99847 77d33d 99845->99847 99849 77d457 99846->99849 99848 719997 84 API calls 99847->99848 99850 77d349 99848->99850 99851 715956 67 API calls 99849->99851 99853 7146f9 59 API calls 99850->99853 99852 77d466 99851->99852 99854 77d49e 99852->99854 99855 77d46a GetLastError 99852->99855 99856 77d35e 99853->99856 99860 77d500 99854->99860 99861 77d4c9 99854->99861 99857 77d483 99855->99857 99858 717c8e 59 API calls 99856->99858 99877 77d3f3 Mailbox 99857->99877 100127 715a1a CloseHandle 99857->100127 99859 77d391 99858->99859 99862 77d3e3 99859->99862 99868 773e73 3 API calls 99859->99868 99863 730ff6 Mailbox 59 API calls 99860->99863 99864 730ff6 Mailbox 59 API calls 99861->99864 99867 719c9c 59 API calls 99862->99867 99869 77d505 99863->99869 99865 77d4ce 99864->99865 99870 77d4df 99865->99870 99872 7177c7 59 API calls 99865->99872 99867->99880 99871 77d3a1 99868->99871 99874 7177c7 59 API calls 99869->99874 99869->99877 100128 77f835 59 API calls 2 library calls 99870->100128 99871->99862 99873 77d3a5 99871->99873 99872->99870 99876 717f41 59 API calls 99873->99876 99874->99877 99878 77d3b2 99876->99878 99877->99823 100125 773c66 63 API calls Mailbox 99878->100125 99880->99838 99880->99877 99881 77d3bb Mailbox 99881->99862 99883 77d310 99882->99883 99884 77d305 99882->99884 99888 7177c7 59 API calls 99883->99888 99927 77d3ea Mailbox 99883->99927 99885 719c9c 59 API calls 99884->99885 99885->99883 99886 730ff6 Mailbox 59 API calls 99887 77d433 99886->99887 99889 77d43f 99887->99889 100130 715906 60 API calls Mailbox 99887->100130 99890 77d334 99888->99890 99893 719997 84 API calls 99889->99893 99892 7177c7 59 API calls 99890->99892 99894 77d33d 99892->99894 99896 77d457 99893->99896 99895 719997 84 API calls 99894->99895 99897 77d349 99895->99897 99898 715956 67 API calls 99896->99898 99900 7146f9 59 API calls 99897->99900 99899 77d466 99898->99899 99901 77d49e 99899->99901 99902 77d46a GetLastError 99899->99902 99903 77d35e 99900->99903 99907 77d500 99901->99907 99908 77d4c9 99901->99908 99904 77d483 99902->99904 99905 717c8e 59 API calls 99903->99905 99924 77d3f3 Mailbox 99904->99924 100131 715a1a CloseHandle 99904->100131 99906 77d391 99905->99906 99909 77d3e3 99906->99909 99915 773e73 3 API calls 99906->99915 99910 730ff6 Mailbox 59 API calls 99907->99910 99911 730ff6 Mailbox 59 API calls 99908->99911 99914 719c9c 59 API calls 99909->99914 99916 77d505 99910->99916 99912 77d4ce 99911->99912 99917 77d4df 99912->99917 99919 7177c7 59 API calls 99912->99919 99914->99927 99918 77d3a1 99915->99918 99921 7177c7 59 API calls 99916->99921 99916->99924 100132 77f835 59 API calls 2 library calls 99917->100132 99918->99909 99920 77d3a5 99918->99920 99919->99917 99923 717f41 59 API calls 99920->99923 99921->99924 99925 77d3b2 99923->99925 99924->99823 100129 773c66 63 API calls Mailbox 99925->100129 99927->99886 99927->99924 99928 77d3bb Mailbox 99928->99909 99930 719bf8 59 API calls 99929->99930 99931 72213b 99930->99931 99933 730ff6 Mailbox 59 API calls 99931->99933 99936 7569af 99931->99936 99934 722154 99933->99934 99937 722164 99934->99937 100148 715906 60 API calls Mailbox 99934->100148 99935 722189 99941 719c9c 59 API calls 99935->99941 99945 722196 99935->99945 99936->99935 100152 77f7df 59 API calls 99936->100152 99939 719997 84 API calls 99937->99939 99940 722172 99939->99940 99942 715956 67 API calls 99940->99942 99943 7569f7 99941->99943 99944 722181 99942->99944 99943->99945 99946 7569ff 99943->99946 99944->99935 99944->99936 100151 715a1a CloseHandle 99944->100151 99947 715e3f 2 API calls 99945->99947 99948 719c9c 59 API calls 99946->99948 99950 72219d 99947->99950 99948->99950 99951 756a11 99950->99951 99952 7221b7 99950->99952 99953 730ff6 Mailbox 59 API calls 99951->99953 99954 7177c7 59 API calls 99952->99954 99955 756a17 99953->99955 99956 7221bf 99954->99956 99957 756a2b 99955->99957 100153 7159b0 ReadFile SetFilePointerEx 99955->100153 100133 7156d2 99956->100133 99963 756a2f _memmove 99957->99963 100154 77794e 59 API calls 2 library calls 99957->100154 99961 7221ce 99961->99963 100149 719b9c 59 API calls Mailbox 99961->100149 99964 7221e2 Mailbox 99965 72221c 99964->99965 99966 715dcf CloseHandle 99964->99966 99965->99823 99967 722210 99966->99967 99967->99965 100150 715a1a CloseHandle 99967->100150 100178 76f8f2 99969->100178 99971 792529 100197 719b9c 59 API calls Mailbox 99971->100197 99973 792545 Mailbox 99973->99823 99975 78cdf1 130 API calls 99974->99975 99976 78e25b 99975->99976 99976->99823 99978 7177c7 59 API calls 99977->99978 99979 78c608 99978->99979 99980 7177c7 59 API calls 99979->99980 99981 78c610 99980->99981 99982 7177c7 59 API calls 99981->99982 99983 78c618 99982->99983 99984 719997 84 API calls 99983->99984 99998 78c626 99984->99998 99985 717d2c 59 API calls 99985->99998 99986 78c80f 99987 78c83c Mailbox 99986->99987 100201 719b9c 59 API calls Mailbox 99986->100201 99987->99814 99988 78c7f6 99990 717e0b 59 API calls 99988->99990 99994 78c803 99990->99994 99991 717a84 59 API calls 99991->99998 99992 78c811 99995 717e0b 59 API calls 99992->99995 99993 7181a7 59 API calls 99993->99998 99996 717c8e 59 API calls 99994->99996 99997 78c820 99995->99997 99996->99986 100000 717c8e 59 API calls 99997->100000 99998->99985 99998->99986 99998->99987 99998->99988 99998->99991 99998->99992 99998->99993 99999 717faf 59 API calls 99998->99999 100001 717faf 59 API calls 99998->100001 100006 719997 84 API calls 99998->100006 100007 717e0b 59 API calls 99998->100007 100008 717c8e 59 API calls 99998->100008 100002 78c6bd CharUpperBuffW 99999->100002 100000->99986 100004 78c77d CharUpperBuffW 100001->100004 100199 71859a 68 API calls 100002->100199 100200 71c707 69 API calls 2 library calls 100004->100200 100006->99998 100007->99998 100008->99998 100010 777bec 100009->100010 100011 730ff6 Mailbox 59 API calls 100010->100011 100012 777bfa 100011->100012 100013 777c08 100012->100013 100014 7177c7 59 API calls 100012->100014 100013->99814 100014->100013 100202 766636 100015->100202 100017 766702 100017->99814 100018->99801 100019->99801 100020->99823 100021->99817 100022->99805 100023->99820 100024->99814 100025->99814 100026->99814 100027->99823 100028->99793 100029->99812 100030->99812 100031->99812 100032->99794 100033->99787 100034->99794 100036 719997 84 API calls 100035->100036 100037 78ce2e 100036->100037 100041 78ce75 Mailbox 100037->100041 100073 78dab9 100037->100073 100039 78d242 100112 78dbdc 92 API calls Mailbox 100039->100112 100041->99834 100043 78d251 100045 78d0db 100043->100045 100046 78d25d 100043->100046 100044 78cec6 Mailbox 100044->100041 100047 719997 84 API calls 100044->100047 100060 78d0cd 100044->100060 100105 77f835 59 API calls 2 library calls 100044->100105 100106 78d2f3 61 API calls 2 library calls 100044->100106 100086 78cc82 100045->100086 100046->100041 100047->100044 100052 78d114 100101 730e48 100052->100101 100055 78d12e 100107 77a0b5 89 API calls 4 library calls 100055->100107 100056 78d147 100058 71942e 59 API calls 100056->100058 100061 78d153 100058->100061 100059 78d139 GetCurrentProcess TerminateProcess 100059->100056 100060->100039 100060->100045 100062 7191b0 59 API calls 100061->100062 100063 78d169 100062->100063 100072 78d190 100063->100072 100108 718ea0 59 API calls Mailbox 100063->100108 100064 78d2b8 100064->100041 100068 78d2cc FreeLibrary 100064->100068 100066 78d17f 100109 78d95d 107 API calls _free 100066->100109 100068->100041 100072->100064 100110 718ea0 59 API calls Mailbox 100072->100110 100111 719e9c 60 API calls Mailbox 100072->100111 100113 78d95d 107 API calls _free 100072->100113 100074 717faf 59 API calls 100073->100074 100075 78dad4 CharLowerBuffW 100074->100075 100114 76f658 100075->100114 100079 7177c7 59 API calls 100080 78db0d 100079->100080 100081 7179ab 59 API calls 100080->100081 100082 78db24 100081->100082 100084 717e8c 59 API calls 100082->100084 100083 78db6c Mailbox 100083->100044 100085 78db30 Mailbox 100084->100085 100085->100083 100121 78d2f3 61 API calls 2 library calls 100085->100121 100087 78cc9d 100086->100087 100091 78ccf2 100086->100091 100088 730ff6 Mailbox 59 API calls 100087->100088 100090 78ccbf 100088->100090 100089 730ff6 Mailbox 59 API calls 100089->100090 100090->100089 100090->100091 100092 78dd64 100091->100092 100093 78df8d Mailbox 100092->100093 100100 78dd87 _strcat _wcscpy __NMSG_WRITE 100092->100100 100093->100052 100094 719cf8 59 API calls 100094->100100 100095 719d46 59 API calls 100095->100100 100096 719c9c 59 API calls 100096->100100 100097 719997 84 API calls 100097->100100 100098 73594c 58 API calls __crtCompareStringA_stat 100098->100100 100100->100093 100100->100094 100100->100095 100100->100096 100100->100097 100100->100098 100124 775b29 61 API calls 2 library calls 100100->100124 100102 730e5d 100101->100102 100103 730ef5 VirtualAlloc 100102->100103 100104 730ec3 100102->100104 100103->100104 100104->100055 100104->100056 100105->100044 100106->100044 100107->100059 100108->100066 100109->100072 100110->100072 100111->100072 100112->100043 100113->100072 100116 76f683 __NMSG_WRITE 100114->100116 100115 76f6c2 100115->100079 100115->100085 100116->100115 100117 76f6b8 100116->100117 100120 76f769 100116->100120 100117->100115 100122 717a24 61 API calls 100117->100122 100120->100115 100123 717a24 61 API calls 100120->100123 100121->100083 100122->100117 100123->100120 100124->100100 100125->99881 100126->99842 100127->99877 100128->99877 100129->99928 100130->99889 100131->99924 100132->99924 100134 715702 100133->100134 100135 7156dd 100133->100135 100136 717eec 59 API calls 100134->100136 100135->100134 100139 7156ec 100135->100139 100140 77349a 100136->100140 100137 7734c9 100137->99961 100157 715c18 100139->100157 100140->100137 100155 773436 ReadFile SetFilePointerEx 100140->100155 100156 717a84 59 API calls 2 library calls 100140->100156 100147 7735d8 Mailbox 100147->99961 100148->99937 100149->99964 100150->99965 100151->99936 100152->99936 100153->99957 100154->99963 100155->100140 100156->100140 100158 730ff6 Mailbox 59 API calls 100157->100158 100159 715c2b 100158->100159 100160 730ff6 Mailbox 59 API calls 100159->100160 100161 715c37 100160->100161 100162 715632 100161->100162 100169 715a2f 100162->100169 100164 715d20 2 API calls 100166 715643 100164->100166 100165 715674 100165->100147 100168 71793a 61 API calls Mailbox 100165->100168 100166->100164 100166->100165 100176 715bda 59 API calls 2 library calls 100166->100176 100168->100147 100170 74e065 100169->100170 100171 715a40 100169->100171 100177 766443 59 API calls Mailbox 100170->100177 100171->100166 100173 74e06f 100174 730ff6 Mailbox 59 API calls 100173->100174 100175 74e07b 100174->100175 100176->100166 100177->100173 100179 7177c7 59 API calls 100178->100179 100180 76f905 100179->100180 100181 717b76 59 API calls 100180->100181 100182 76f919 100181->100182 100183 76f658 61 API calls 100182->100183 100189 76f93b 100182->100189 100184 76f935 100183->100184 100186 7179ab 59 API calls 100184->100186 100184->100189 100185 76f658 61 API calls 100185->100189 100186->100189 100187 76f9b5 100190 7179ab 59 API calls 100187->100190 100188 7179ab 59 API calls 100188->100189 100189->100185 100189->100187 100189->100188 100191 717c8e 59 API calls 100189->100191 100192 76f9ce 100190->100192 100191->100189 100193 717c8e 59 API calls 100192->100193 100194 76f9da 100193->100194 100195 76f9e9 Mailbox 100194->100195 100198 7180d7 59 API calls 2 library calls 100194->100198 100195->99971 100197->99973 100198->100195 100199->99998 100200->99998 100201->99987 100203 766641 100202->100203 100204 76665e 100202->100204 100203->100204 100206 766621 59 API calls Mailbox 100203->100206 100204->100017 100206->100203 100207 750226 100208 71ade2 Mailbox 100207->100208 100209 71b6c1 100208->100209 100211 750c86 100208->100211 100213 750c8f 100208->100213 100215 7500e0 VariantClear 100208->100215 100217 77d2e6 101 API calls 100208->100217 100218 722123 95 API calls 100208->100218 100219 77d2e5 101 API calls 100208->100219 100220 78e24b 130 API calls 100208->100220 100221 79251d 62 API calls 100208->100221 100222 78474d 331 API calls 100208->100222 100223 78e237 130 API calls 100208->100223 100224 719df0 59 API calls Mailbox 100208->100224 100225 767405 59 API calls 100208->100225 100226 77a0b5 89 API calls 4 library calls 100209->100226 100212 7666f4 Mailbox 59 API calls 100211->100212 100212->100213 100215->100208 100217->100208 100218->100208 100219->100208 100220->100208 100221->100208 100222->100208 100223->100208 100224->100208 100225->100208 100226->100211 100227 711055 100232 712649 100227->100232 100230 732f80 __cinit 67 API calls 100231 711064 100230->100231 100233 7177c7 59 API calls 100232->100233 100234 7126b7 100233->100234 100239 713582 100234->100239 100237 712754 100238 71105a 100237->100238 100242 713416 59 API calls 2 library calls 100237->100242 100238->100230 100243 7135b0 100239->100243 100242->100237 100244 7135bd 100243->100244 100245 7135a1 100243->100245 100244->100245 100246 7135c4 RegOpenKeyExW 100244->100246 100245->100237 100246->100245 100247 7135de RegQueryValueExW 100246->100247 100248 713614 RegCloseKey 100247->100248 100249 7135ff 100247->100249 100248->100245 100249->100248 100250 711066 100255 71f8cf 100250->100255 100252 71106c 100253 732f80 __cinit 67 API calls 100252->100253 100254 711076 100253->100254 100256 71f8f0 100255->100256 100288 730143 100256->100288 100260 71f937 100261 7177c7 59 API calls 100260->100261 100262 71f941 100261->100262 100263 7177c7 59 API calls 100262->100263 100264 71f94b 100263->100264 100265 7177c7 59 API calls 100264->100265 100266 71f955 100265->100266 100267 7177c7 59 API calls 100266->100267 100268 71f993 100267->100268 100269 7177c7 59 API calls 100268->100269 100270 71fa5e 100269->100270 100298 7260e7 100270->100298 100274 71fa90 100275 7177c7 59 API calls 100274->100275 100276 71fa9a 100275->100276 100326 72ffde 100276->100326 100278 71fae1 100279 71faf1 GetStdHandle 100278->100279 100280 7549d5 100279->100280 100281 71fb3d 100279->100281 100280->100281 100283 7549de 100280->100283 100282 71fb45 OleInitialize 100281->100282 100282->100252 100333 776dda 64 API calls Mailbox 100283->100333 100285 7549e5 100334 7774a9 CreateThread 100285->100334 100287 7549f1 CloseHandle 100287->100282 100335 73021c 100288->100335 100291 73021c 59 API calls 100292 730185 100291->100292 100293 7177c7 59 API calls 100292->100293 100294 730191 100293->100294 100295 717d2c 59 API calls 100294->100295 100296 71f8f6 100295->100296 100297 7303a2 6 API calls 100296->100297 100297->100260 100299 7177c7 59 API calls 100298->100299 100300 7260f7 100299->100300 100301 7177c7 59 API calls 100300->100301 100302 7260ff 100301->100302 100342 725bfd 100302->100342 100305 725bfd 59 API calls 100306 72610f 100305->100306 100307 7177c7 59 API calls 100306->100307 100308 72611a 100307->100308 100309 730ff6 Mailbox 59 API calls 100308->100309 100310 71fa68 100309->100310 100311 726259 100310->100311 100312 726267 100311->100312 100313 7177c7 59 API calls 100312->100313 100314 726272 100313->100314 100315 7177c7 59 API calls 100314->100315 100316 72627d 100315->100316 100317 7177c7 59 API calls 100316->100317 100318 726288 100317->100318 100319 7177c7 59 API calls 100318->100319 100320 726293 100319->100320 100321 725bfd 59 API calls 100320->100321 100322 72629e 100321->100322 100323 730ff6 Mailbox 59 API calls 100322->100323 100324 7262a5 RegisterWindowMessageW 100323->100324 100324->100274 100327 765cc3 100326->100327 100328 72ffee 100326->100328 100345 779d71 60 API calls 100327->100345 100329 730ff6 Mailbox 59 API calls 100328->100329 100332 72fff6 100329->100332 100331 765cce 100332->100278 100333->100285 100334->100287 100346 77748f 65 API calls 100334->100346 100336 7177c7 59 API calls 100335->100336 100337 730227 100336->100337 100338 7177c7 59 API calls 100337->100338 100339 73022f 100338->100339 100340 7177c7 59 API calls 100339->100340 100341 73017b 100340->100341 100341->100291 100343 7177c7 59 API calls 100342->100343 100344 725c05 100343->100344 100344->100305 100345->100331 100347 711016 100352 714ad2 100347->100352 100350 732f80 __cinit 67 API calls 100351 711025 100350->100351 100353 730ff6 Mailbox 59 API calls 100352->100353 100354 714ada 100353->100354 100355 71101b 100354->100355 100359 714a94 100354->100359 100355->100350 100360 714aaf 100359->100360 100361 714a9d 100359->100361 100363 714afe 100360->100363 100362 732f80 __cinit 67 API calls 100361->100362 100362->100360 100364 7177c7 59 API calls 100363->100364 100365 714b16 GetVersionExW 100364->100365 100366 717d2c 59 API calls 100365->100366 100367 714b59 100366->100367 100368 717e8c 59 API calls 100367->100368 100377 714b86 100367->100377 100369 714b7a 100368->100369 100370 717886 59 API calls 100369->100370 100370->100377 100371 714bf1 GetCurrentProcess IsWow64Process 100372 714c0a 100371->100372 100374 714c20 100372->100374 100375 714c89 GetSystemInfo 100372->100375 100373 74dc8d 100387 714c95 100374->100387 100376 714c56 100375->100376 100376->100355 100377->100371 100377->100373 100380 714c32 100383 714c95 2 API calls 100380->100383 100381 714c7d GetSystemInfo 100382 714c47 100381->100382 100382->100376 100385 714c4d FreeLibrary 100382->100385 100384 714c3a GetNativeSystemInfo 100383->100384 100384->100382 100385->100376 100388 714c2e 100387->100388 100389 714c9e LoadLibraryA 100387->100389 100388->100380 100388->100381 100389->100388 100390 714caf GetProcAddress 100389->100390 100390->100388 100391 71e70b 100394 71d260 100391->100394 100393 71e719 100395 71d27d 100394->100395 100423 71d4dd 100394->100423 100396 752abb 100395->100396 100397 752b0a 100395->100397 100427 71d2a4 100395->100427 100400 752abe 100396->100400 100405 752ad9 100396->100405 100438 78a6fb 331 API calls __cinit 100397->100438 100401 752aca 100400->100401 100400->100427 100436 78ad0f 331 API calls 100401->100436 100402 732f80 __cinit 67 API calls 100402->100427 100405->100423 100437 78b1b7 331 API calls 3 library calls 100405->100437 100406 71d594 100430 718bb2 68 API calls 100406->100430 100407 752cdf 100407->100407 100408 71d6ab 100408->100393 100412 71d5a3 100412->100393 100413 752c26 100442 78aa66 89 API calls 100413->100442 100416 718620 69 API calls 100416->100427 100423->100408 100443 77a0b5 89 API calls 4 library calls 100423->100443 100424 71a000 331 API calls 100424->100427 100425 7181a7 59 API calls 100425->100427 100427->100402 100427->100406 100427->100408 100427->100413 100427->100416 100427->100423 100427->100424 100427->100425 100428 7188a0 68 API calls __cinit 100427->100428 100429 7186a2 68 API calls 100427->100429 100431 71859a 68 API calls 100427->100431 100432 71d0dc 331 API calls 100427->100432 100433 719f3a 59 API calls Mailbox 100427->100433 100434 71d060 89 API calls 100427->100434 100435 71cedd 331 API calls 100427->100435 100439 718bb2 68 API calls 100427->100439 100440 719e9c 60 API calls Mailbox 100427->100440 100441 766d03 60 API calls 100427->100441 100428->100427 100429->100427 100430->100412 100431->100427 100432->100427 100433->100427 100434->100427 100435->100427 100436->100408 100437->100423 100438->100427 100439->100427 100440->100427 100441->100427 100442->100423 100443->100407 100444 71568a 100445 715c18 59 API calls 100444->100445 100446 71569c 100445->100446 100447 715632 61 API calls 100446->100447 100448 7156aa 100447->100448 100449 7156ba Mailbox 100448->100449 100451 7181c1 61 API calls Mailbox 100448->100451 100451->100449 100452 71107d 100457 7171eb 100452->100457 100454 71108c 100455 732f80 __cinit 67 API calls 100454->100455 100456 711096 100455->100456 100458 7171fb __write_nolock 100457->100458 100459 7177c7 59 API calls 100458->100459 100460 7172b1 100459->100460 100461 714864 61 API calls 100460->100461 100462 7172ba 100461->100462 100488 73074f 100462->100488 100465 717e0b 59 API calls 100466 7172d3 100465->100466 100467 713f84 59 API calls 100466->100467 100468 7172e2 100467->100468 100469 7177c7 59 API calls 100468->100469 100470 7172eb 100469->100470 100471 717eec 59 API calls 100470->100471 100472 7172f4 RegOpenKeyExW 100471->100472 100473 74ecda RegQueryValueExW 100472->100473 100478 717316 Mailbox 100472->100478 100474 74ecf7 100473->100474 100475 74ed6c RegCloseKey 100473->100475 100476 730ff6 Mailbox 59 API calls 100474->100476 100475->100478 100487 74ed7e _wcscat Mailbox __NMSG_WRITE 100475->100487 100477 74ed10 100476->100477 100480 71538e 59 API calls 100477->100480 100478->100454 100479 717b52 59 API calls 100479->100487 100481 74ed1b RegQueryValueExW 100480->100481 100482 74ed38 100481->100482 100484 74ed52 100481->100484 100483 717d2c 59 API calls 100482->100483 100483->100484 100484->100475 100485 717f41 59 API calls 100485->100487 100486 713f84 59 API calls 100486->100487 100487->100478 100487->100479 100487->100485 100487->100486 100489 741b90 __write_nolock 100488->100489 100490 73075c GetFullPathNameW 100489->100490 100491 73077e 100490->100491 100492 717d2c 59 API calls 100491->100492 100493 7172c5 100492->100493 100493->100465 100494 9f2410 100508 9f0000 100494->100508 100496 9f24da 100511 9f2300 100496->100511 100514 9f3500 GetPEB 100508->100514 100510 9f068b 100510->100496 100512 9f2309 Sleep 100511->100512 100513 9f2317 100512->100513 100515 9f352a 100514->100515 100515->100510

                      Control-flow Graph

                      APIs
                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00713B7A
                      • IsDebuggerPresent.KERNEL32 ref: 00713B8C
                      • GetFullPathNameW.KERNEL32(00007FFF,?,?,007D62F8,007D62E0,?,?), ref: 00713BFD
                        • Part of subcall function 00717D2C: _memmove.LIBCMT ref: 00717D66
                        • Part of subcall function 00720A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00713C26,007D62F8,?,?,?), ref: 00720ACE
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00713C81
                      • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,007C93F0,00000010), ref: 0074D4BC
                      • SetCurrentDirectoryW.KERNEL32(?,007D62F8,?,?,?), ref: 0074D4F4
                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,007C5D40,007D62F8,?,?,?), ref: 0074D57A
                      • ShellExecuteW.SHELL32(00000000,?,?), ref: 0074D581
                        • Part of subcall function 00713A58: GetSysColorBrush.USER32(0000000F), ref: 00713A62
                        • Part of subcall function 00713A58: LoadCursorW.USER32(00000000,00007F00), ref: 00713A71
                        • Part of subcall function 00713A58: LoadIconW.USER32(00000063), ref: 00713A88
                        • Part of subcall function 00713A58: LoadIconW.USER32(000000A4), ref: 00713A9A
                        • Part of subcall function 00713A58: LoadIconW.USER32(000000A2), ref: 00713AAC
                        • Part of subcall function 00713A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00713AD2
                        • Part of subcall function 00713A58: RegisterClassExW.USER32(?), ref: 00713B28
                        • Part of subcall function 007139E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00713A15
                        • Part of subcall function 007139E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00713A36
                        • Part of subcall function 007139E7: ShowWindow.USER32(00000000,?,?), ref: 00713A4A
                        • Part of subcall function 007139E7: ShowWindow.USER32(00000000,?,?), ref: 00713A53
                        • Part of subcall function 007143DB: _memset.LIBCMT ref: 00714401
                        • Part of subcall function 007143DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 007144A6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                      • String ID: This is a third-party compiled AutoIt script.$runas$%z
                      • API String ID: 529118366-412178647
                      • Opcode ID: 28f5b364ab1f4d93e3b5b2c4968fcf2e7d5393d2ffc8bbad736d36781781dcee
                      • Instruction ID: a710e1dc1a0d195148d162b0a338e8b5cde69ada62a8c4dfe2d0b56e8ee05086
                      • Opcode Fuzzy Hash: 28f5b364ab1f4d93e3b5b2c4968fcf2e7d5393d2ffc8bbad736d36781781dcee
                      • Instruction Fuzzy Hash: 2851DB70905288EACF15AFB8DC0AEED7B75BF04700F04817AF451A21E2DB7C5A86CB65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 984 714fe9-715001 CreateStreamOnHGlobal 985 715021-715026 984->985 986 715003-71501a FindResourceExW 984->986 987 715020 986->987 988 74dd5c-74dd6b LoadResource 986->988 987->985 988->987 989 74dd71-74dd7f SizeofResource 988->989 989->987 990 74dd85-74dd90 LockResource 989->990 990->987 991 74dd96-74ddb4 990->991 991->987
                      APIs
                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00714EEE,?,?,00000000,00000000), ref: 00714FF9
                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00714EEE,?,?,00000000,00000000), ref: 00715010
                      • LoadResource.KERNEL32(?,00000000,?,?,00714EEE,?,?,00000000,00000000,?,?,?,?,?,?,00714F8F), ref: 0074DD60
                      • SizeofResource.KERNEL32(?,00000000,?,?,00714EEE,?,?,00000000,00000000,?,?,?,?,?,?,00714F8F), ref: 0074DD75
                      • LockResource.KERNEL32(Nq,?,?,00714EEE,?,?,00000000,00000000,?,?,?,?,?,?,00714F8F,00000000), ref: 0074DD88
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                      • String ID: SCRIPT$Nq
                      • API String ID: 3051347437-3307269046
                      • Opcode ID: 68b58eb8811ba1b1c2cfc7fabbf682a1fa949a3458bf0d30a0240d03f0d6db23
                      • Instruction ID: 51a158f572fc254ff81c675957d9c8a507b5a532ed0ab866967b5572dccff6d4
                      • Opcode Fuzzy Hash: 68b58eb8811ba1b1c2cfc7fabbf682a1fa949a3458bf0d30a0240d03f0d6db23
                      • Instruction Fuzzy Hash: E9117C75200700BFD7258B69DC58F6B7BBAFBC9B11F20816DF406C62A0DB75EC418A64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1048 714afe-714b5e call 7177c7 GetVersionExW call 717d2c 1053 714b64 1048->1053 1054 714c69-714c6b 1048->1054 1056 714b67-714b6c 1053->1056 1055 74db90-74db9c 1054->1055 1057 74db9d-74dba1 1055->1057 1058 714c70-714c71 1056->1058 1059 714b72 1056->1059 1061 74dba4-74dbb0 1057->1061 1062 74dba3 1057->1062 1060 714b73-714baa call 717e8c call 717886 1058->1060 1059->1060 1070 714bb0-714bb1 1060->1070 1071 74dc8d-74dc90 1060->1071 1061->1057 1064 74dbb2-74dbb7 1061->1064 1062->1061 1064->1056 1066 74dbbd-74dbc4 1064->1066 1066->1055 1068 74dbc6 1066->1068 1072 74dbcb-74dbce 1068->1072 1070->1072 1073 714bb7-714bc2 1070->1073 1074 74dc92 1071->1074 1075 74dca9-74dcad 1071->1075 1076 714bf1-714c08 GetCurrentProcess IsWow64Process 1072->1076 1077 74dbd4-74dbf2 1072->1077 1082 74dc13-74dc19 1073->1082 1083 714bc8-714bca 1073->1083 1084 74dc95 1074->1084 1078 74dcaf-74dcb8 1075->1078 1079 74dc98-74dca1 1075->1079 1080 714c0a 1076->1080 1081 714c0d-714c1e 1076->1081 1077->1076 1085 74dbf8-74dbfe 1077->1085 1078->1084 1092 74dcba-74dcbd 1078->1092 1079->1075 1080->1081 1093 714c20-714c30 call 714c95 1081->1093 1094 714c89-714c93 GetSystemInfo 1081->1094 1090 74dc23-74dc29 1082->1090 1091 74dc1b-74dc1e 1082->1091 1086 714bd0-714bd3 1083->1086 1087 74dc2e-74dc3a 1083->1087 1084->1079 1088 74dc00-74dc03 1085->1088 1089 74dc08-74dc0e 1085->1089 1095 714bd9-714be8 1086->1095 1096 74dc5a-74dc5d 1086->1096 1098 74dc44-74dc4a 1087->1098 1099 74dc3c-74dc3f 1087->1099 1088->1076 1089->1076 1090->1076 1091->1076 1092->1079 1105 714c32-714c3f call 714c95 1093->1105 1106 714c7d-714c87 GetSystemInfo 1093->1106 1097 714c56-714c66 1094->1097 1101 74dc4f-74dc55 1095->1101 1102 714bee 1095->1102 1096->1076 1104 74dc63-74dc78 1096->1104 1098->1076 1099->1076 1101->1076 1102->1076 1107 74dc82-74dc88 1104->1107 1108 74dc7a-74dc7d 1104->1108 1113 714c41-714c45 GetNativeSystemInfo 1105->1113 1114 714c76-714c7b 1105->1114 1109 714c47-714c4b 1106->1109 1107->1076 1108->1076 1109->1097 1112 714c4d-714c50 FreeLibrary 1109->1112 1112->1097 1113->1109 1114->1113
                      APIs
                      • GetVersionExW.KERNEL32(?), ref: 00714B2B
                        • Part of subcall function 00717D2C: _memmove.LIBCMT ref: 00717D66
                      • GetCurrentProcess.KERNEL32(?,0079FAEC,00000000,00000000,?), ref: 00714BF8
                      • IsWow64Process.KERNEL32(00000000), ref: 00714BFF
                      • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00714C45
                      • FreeLibrary.KERNEL32(00000000), ref: 00714C50
                      • GetSystemInfo.KERNEL32(00000000), ref: 00714C81
                      • GetSystemInfo.KERNEL32(00000000), ref: 00714C8D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                      • String ID:
                      • API String ID: 1986165174-0
                      • Opcode ID: a3b78d08a62a791aba88b37d5e3c4106ece974c257437b871b8e55071d42db3c
                      • Instruction ID: 5c9ddfc188f617455c9d4b2d2b34e52f5e5dffb4029fb3407ee04d8f62d1ca2d
                      • Opcode Fuzzy Hash: a3b78d08a62a791aba88b37d5e3c4106ece974c257437b871b8e55071d42db3c
                      • Instruction Fuzzy Hash: A891C57154E7C4DEC731CB6C94951EABFE5AF26300B484D9ED0CB93A81D228E988C769
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID: Dt}$Dt}$Dt}$Dt}$Variable must be of type 'Object'.
                      • API String ID: 0-529152164
                      • Opcode ID: a931ecaa1b4af49a9e6e4446412be5df05c3fdbb7bac63e034e454b6b143f872
                      • Instruction ID: 3b48b46662225f04c648d9c0d3ff834467c12c1ca442f34d5d3453c0ab836027
                      • Opcode Fuzzy Hash: a931ecaa1b4af49a9e6e4446412be5df05c3fdbb7bac63e034e454b6b143f872
                      • Instruction Fuzzy Hash: 25A26974A04205CBDB24CF58C884AEEB7B1FF48314F648069ED16AB391D779ADC6CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetFileAttributesW.KERNELBASE(?,0074E7C1), ref: 007746A6
                      • FindFirstFileW.KERNELBASE(?,?), ref: 007746B7
                      • FindClose.KERNEL32(00000000), ref: 007746C7
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: FileFind$AttributesCloseFirst
                      • String ID:
                      • API String ID: 48322524-0
                      • Opcode ID: 30681d1f3f693afb82d7661606f68a1514d2b56c043c4b54495cbf0fb0c06309
                      • Instruction ID: a34a8e4b070615b2f4d19e3c6bab51cf6023ac5c1ffff960ceff160dc0281894
                      • Opcode Fuzzy Hash: 30681d1f3f693afb82d7661606f68a1514d2b56c043c4b54495cbf0fb0c06309
                      • Instruction Fuzzy Hash: CDE0D8314105005B4E106738EC4D4EE775C9E06375F108716F839C10E0E7B859708599
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00720BBB
                      • timeGetTime.WINMM ref: 00720E76
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00720FB3
                      • TranslateMessage.USER32(?), ref: 00720FC7
                      • DispatchMessageW.USER32(?), ref: 00720FD5
                      • Sleep.KERNEL32(0000000A), ref: 00720FDF
                      • LockWindowUpdate.USER32(00000000,?,?), ref: 0072105A
                      • DestroyWindow.USER32 ref: 00721066
                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00721080
                      • Sleep.KERNEL32(0000000A,?,?), ref: 007552AD
                      • TranslateMessage.USER32(?), ref: 0075608A
                      • DispatchMessageW.USER32(?), ref: 00756098
                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 007560AC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                      • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pr}$pr}$pr}$pr}
                      • API String ID: 4003667617-1723423589
                      • Opcode ID: 38cf0dd39e951f745acdf1bb7609a4cd80ad9b5633a9e1094a279af9572f747a
                      • Instruction ID: ff7e577af3c18232657800829579ddec38a6974df6f8ce82dc71e75cc45edd90
                      • Opcode Fuzzy Hash: 38cf0dd39e951f745acdf1bb7609a4cd80ad9b5633a9e1094a279af9572f747a
                      • Instruction Fuzzy Hash: D9B2C670608741DFD724DF24D898BAAB7E5FF84304F14891DE84A87291D7BDE889CB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                        • Part of subcall function 007791E9: __time64.LIBCMT ref: 007791F3
                        • Part of subcall function 00715045: _fseek.LIBCMT ref: 0071505D
                      • __wsplitpath.LIBCMT ref: 007794BE
                        • Part of subcall function 0073432E: __wsplitpath_helper.LIBCMT ref: 0073436E
                      • _wcscpy.LIBCMT ref: 007794D1
                      • _wcscat.LIBCMT ref: 007794E4
                      • __wsplitpath.LIBCMT ref: 00779509
                      • _wcscat.LIBCMT ref: 0077951F
                      • _wcscat.LIBCMT ref: 00779532
                        • Part of subcall function 0077922F: _memmove.LIBCMT ref: 00779268
                        • Part of subcall function 0077922F: _memmove.LIBCMT ref: 00779277
                      • _wcscmp.LIBCMT ref: 00779479
                        • Part of subcall function 007799BE: _wcscmp.LIBCMT ref: 00779AAE
                        • Part of subcall function 007799BE: _wcscmp.LIBCMT ref: 00779AC1
                      • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007796DC
                      • _wcsncpy.LIBCMT ref: 0077974F
                      • DeleteFileW.KERNEL32(?,?), ref: 00779785
                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0077979B
                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007797AC
                      • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007797BE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                      • String ID:
                      • API String ID: 1500180987-0
                      • Opcode ID: 0cb70d25cad803a2f332094eb74badc065ee47e4d30b9e1a7b43a223ee11b674
                      • Instruction ID: 118eb63a97bf888d3e61769aa9939968dd45a5024a21ab3a7626c3b7309e17a3
                      • Opcode Fuzzy Hash: 0cb70d25cad803a2f332094eb74badc065ee47e4d30b9e1a7b43a223ee11b674
                      • Instruction Fuzzy Hash: 30C14DB1E01219EADF15DFA4CC85ADEB7BDAF49340F0080AAF609E7151DB349A848F65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • GetSysColorBrush.USER32(0000000F), ref: 00713074
                      • RegisterClassExW.USER32(00000030), ref: 0071309E
                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007130AF
                      • InitCommonControlsEx.COMCTL32(?), ref: 007130CC
                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007130DC
                      • LoadIconW.USER32(000000A9), ref: 007130F2
                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00713101
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                      • API String ID: 2914291525-1005189915
                      • Opcode ID: c94932600989295eb09c8d3615452280f93d682f79b131295803a473036c191a
                      • Instruction ID: ec40b1aa08e58f98d16710e4367444849db023e4fc5a4950a3bafb547f0c2c78
                      • Opcode Fuzzy Hash: c94932600989295eb09c8d3615452280f93d682f79b131295803a473036c191a
                      • Instruction Fuzzy Hash: 93314BB1901349AFDB10DFA4EC88AD9BFF4FB09314F14816EE541E62A1D7BA4541CF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • GetSysColorBrush.USER32(0000000F), ref: 00713074
                      • RegisterClassExW.USER32(00000030), ref: 0071309E
                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007130AF
                      • InitCommonControlsEx.COMCTL32(?), ref: 007130CC
                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007130DC
                      • LoadIconW.USER32(000000A9), ref: 007130F2
                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00713101
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                      • API String ID: 2914291525-1005189915
                      • Opcode ID: a4efad2d3416bdfd136ff16b70b17785a23416021b8cf76ca82d81596937e779
                      • Instruction ID: 1efa672dd8237bb9db83e382fc12688564e7fb71eb3815d8664fa85a24d70e29
                      • Opcode Fuzzy Hash: a4efad2d3416bdfd136ff16b70b17785a23416021b8cf76ca82d81596937e779
                      • Instruction Fuzzy Hash: A321B4B1901218AFDB00DFA8EC49BDDBBF8FB08710F10812BF510E62A0D7B955559F99
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00714864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,007D62F8,?,007137C0,?), ref: 00714882
                        • Part of subcall function 0073074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,007172C5), ref: 00730771
                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00717308
                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0074ECF1
                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0074ED32
                      • RegCloseKey.ADVAPI32(?), ref: 0074ED70
                      • _wcscat.LIBCMT ref: 0074EDC9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                      • API String ID: 2673923337-2727554177
                      • Opcode ID: 8f70819d867a9eb7a6e4769bde212e0821289b21f9ad6312beac0597c5d1049f
                      • Instruction ID: 57ec646139be867fdd8fd3bdefe479ddd176f9524f9f28e525af0c05948446ea
                      • Opcode Fuzzy Hash: 8f70819d867a9eb7a6e4769bde212e0821289b21f9ad6312beac0597c5d1049f
                      • Instruction Fuzzy Hash: F2716D71509341DEC718DF29EC8589BBBF8FF98310F80852EF445831A1EB38A989CB65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 761 713633-713681 763 7136e1-7136e3 761->763 764 713683-713686 761->764 763->764 765 7136e5 763->765 766 7136e7 764->766 767 713688-71368f 764->767 768 7136ca-7136d2 DefWindowProcW 765->768 769 74d31c-74d34a call 7211d0 call 7211f3 766->769 770 7136ed-7136f0 766->770 771 713695-71369a 767->771 772 71375d-713765 PostQuitMessage 767->772 774 7136d8-7136de 768->774 805 74d34f-74d356 769->805 776 7136f2-7136f3 770->776 777 713715-71373c SetTimer RegisterWindowMessageW 770->777 778 7136a0-7136a2 771->778 779 74d38f-74d3a3 call 772a16 771->779 775 713711-713713 772->775 775->774 782 7136f9-71370c KillTimer call 7144cb call 713114 776->782 783 74d2bf-74d2c2 776->783 777->775 784 71373e-713749 CreatePopupMenu 777->784 785 713767-713776 call 714531 778->785 786 7136a8-7136ad 778->786 779->775 797 74d3a9 779->797 782->775 792 74d2c4-74d2c6 783->792 793 74d2f8-74d317 MoveWindow 783->793 784->775 785->775 787 74d374-74d37b 786->787 788 7136b3-7136b8 786->788 787->768 803 74d381-74d38a call 76817e 787->803 795 71374b-71375b call 7145df 788->795 796 7136be-7136c4 788->796 800 74d2e7-74d2f3 SetFocus 792->800 801 74d2c8-74d2cb 792->801 793->775 795->775 796->768 796->805 797->768 800->775 801->796 806 74d2d1-74d2e2 call 7211d0 801->806 803->768 805->768 810 74d35c-74d36f call 7144cb call 7143db 805->810 806->775 810->768
                      APIs
                      • DefWindowProcW.USER32(?,?,?,?), ref: 007136D2
                      • KillTimer.USER32(?,00000001), ref: 007136FC
                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0071371F
                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0071372A
                      • CreatePopupMenu.USER32 ref: 0071373E
                      • PostQuitMessage.USER32(00000000), ref: 0071375F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                      • String ID: TaskbarCreated$%z
                      • API String ID: 129472671-4176258324
                      • Opcode ID: 53d71f8f431231e7dc48e1a1e0d906eb8a0c6f3be13bdc624ab2cb042c90e51d
                      • Instruction ID: 1065afa1e3ed011872719ca3182e6568d8c7d525ac49d24666365b18b4d38321
                      • Opcode Fuzzy Hash: 53d71f8f431231e7dc48e1a1e0d906eb8a0c6f3be13bdc624ab2cb042c90e51d
                      • Instruction Fuzzy Hash: D241E4B1204145ABEB249F6CEC49BF93775FB04300F14412BF902D62E1DA6CAE91A665
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • GetSysColorBrush.USER32(0000000F), ref: 00713A62
                      • LoadCursorW.USER32(00000000,00007F00), ref: 00713A71
                      • LoadIconW.USER32(00000063), ref: 00713A88
                      • LoadIconW.USER32(000000A4), ref: 00713A9A
                      • LoadIconW.USER32(000000A2), ref: 00713AAC
                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00713AD2
                      • RegisterClassExW.USER32(?), ref: 00713B28
                        • Part of subcall function 00713041: GetSysColorBrush.USER32(0000000F), ref: 00713074
                        • Part of subcall function 00713041: RegisterClassExW.USER32(00000030), ref: 0071309E
                        • Part of subcall function 00713041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007130AF
                        • Part of subcall function 00713041: InitCommonControlsEx.COMCTL32(?), ref: 007130CC
                        • Part of subcall function 00713041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007130DC
                        • Part of subcall function 00713041: LoadIconW.USER32(000000A9), ref: 007130F2
                        • Part of subcall function 00713041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00713101
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                      • String ID: #$0$AutoIt v3
                      • API String ID: 423443420-4155596026
                      • Opcode ID: 96591e471bfc34d0f88f8c6a673ca906a995b53f245d86031f76d4cd7a341752
                      • Instruction ID: 00b82f93c0a27bb2bb14e13a23c4829007a9b13bcef2529ec87c08a3042cab8e
                      • Opcode Fuzzy Hash: 96591e471bfc34d0f88f8c6a673ca906a995b53f245d86031f76d4cd7a341752
                      • Instruction Fuzzy Hash: A321FB71902304AFEB109FA8EC49B9D7BB5FB08711F10812BF544A62A0D7BE66549F98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                      • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$b}
                      • API String ID: 1825951767-1680737534
                      • Opcode ID: 5056e1722b52051f3dfd4b29e885c1ce58ccfae84265283677464191675ce099
                      • Instruction ID: b9b605bd18650e46e249262a04022a368a6f2cea3d42a417d4f1673bb41d69db
                      • Opcode Fuzzy Hash: 5056e1722b52051f3dfd4b29e885c1ce58ccfae84265283677464191675ce099
                      • Instruction Fuzzy Hash: 6BA14D7291021DDADF14EBA8CC99EEEB779BF14300F04452AE416B71D1DB7C6A89CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                        • Part of subcall function 007303A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 007303D3
                        • Part of subcall function 007303A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 007303DB
                        • Part of subcall function 007303A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 007303E6
                        • Part of subcall function 007303A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 007303F1
                        • Part of subcall function 007303A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 007303F9
                        • Part of subcall function 007303A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00730401
                        • Part of subcall function 00726259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0071FA90), ref: 007262B4
                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0071FB2D
                      • OleInitialize.OLE32(00000000), ref: 0071FBAA
                      • CloseHandle.KERNEL32(00000000), ref: 007549F2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                      • String ID: <g}$\d}$%z$c}
                      • API String ID: 1986988660-1372319532
                      • Opcode ID: b784f1d6c9fedd0f9ca36da639671c78bae184cb957de6b15f7f27c9d854c078
                      • Instruction ID: 3eac7f01bb1e0ac1894fa1561ee59c5419ddccd2661382f5bb72d74c56edca3c
                      • Opcode Fuzzy Hash: b784f1d6c9fedd0f9ca36da639671c78bae184cb957de6b15f7f27c9d854c078
                      • Instruction Fuzzy Hash: 5A81A5B0902284CEC784EF79EA586557BF5EB88718710C23BD019C73A2EB3D8645CF68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 994 9f2650-9f26fe call 9f0000 997 9f2705-9f272b call 9f3560 CreateFileW 994->997 1000 9f272d 997->1000 1001 9f2732-9f2742 997->1001 1002 9f287d-9f2881 1000->1002 1006 9f2749-9f2763 VirtualAlloc 1001->1006 1007 9f2744 1001->1007 1004 9f28c3-9f28c6 1002->1004 1005 9f2883-9f2887 1002->1005 1008 9f28c9-9f28d0 1004->1008 1009 9f2889-9f288c 1005->1009 1010 9f2893-9f2897 1005->1010 1011 9f276a-9f2781 ReadFile 1006->1011 1012 9f2765 1006->1012 1007->1002 1013 9f2925-9f293a 1008->1013 1014 9f28d2-9f28dd 1008->1014 1009->1010 1015 9f2899-9f28a3 1010->1015 1016 9f28a7-9f28ab 1010->1016 1021 9f2788-9f27c8 VirtualAlloc 1011->1021 1022 9f2783 1011->1022 1012->1002 1017 9f293c-9f2947 VirtualFree 1013->1017 1018 9f294a-9f2952 1013->1018 1023 9f28df 1014->1023 1024 9f28e1-9f28ed 1014->1024 1015->1016 1019 9f28ad-9f28b7 1016->1019 1020 9f28bb 1016->1020 1017->1018 1019->1020 1020->1004 1025 9f27cf-9f27ea call 9f37b0 1021->1025 1026 9f27ca 1021->1026 1022->1002 1023->1013 1027 9f28ef-9f28ff 1024->1027 1028 9f2901-9f290d 1024->1028 1034 9f27f5-9f27ff 1025->1034 1026->1002 1030 9f2923 1027->1030 1031 9f290f-9f2918 1028->1031 1032 9f291a-9f2920 1028->1032 1030->1008 1031->1030 1032->1030 1035 9f2832-9f2846 call 9f35c0 1034->1035 1036 9f2801-9f2830 call 9f37b0 1034->1036 1042 9f284a-9f284e 1035->1042 1043 9f2848 1035->1043 1036->1034 1044 9f285a-9f285e 1042->1044 1045 9f2850-9f2854 FindCloseChangeNotification 1042->1045 1043->1002 1046 9f286e-9f2877 1044->1046 1047 9f2860-9f286b VirtualFree 1044->1047 1045->1044 1046->997 1046->1002 1047->1046
                      APIs
                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 009F2721
                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 009F2947
                      Memory Dump Source
                      • Source File: 00000000.00000002.1677391334.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9f0000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CreateFileFreeVirtual
                      • String ID:
                      • API String ID: 204039940-0
                      • Opcode ID: 1376b1c019e97a58b345df4903236ecb5f0b8c205347a8d20aa61bd2a2b0f564
                      • Instruction ID: ea2d8b3cc8aecc4a74d26d5b713f82b3625a4aa5523a8e14382f662b30f7a899
                      • Opcode Fuzzy Hash: 1376b1c019e97a58b345df4903236ecb5f0b8c205347a8d20aa61bd2a2b0f564
                      • Instruction Fuzzy Hash: 32A10674E0020DEBDB14DFA4C994BFEBBB5BF48304F208559E615BB280D779AA81CB54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1115 7139e7-713a57 CreateWindowExW * 2 ShowWindow * 2
                      APIs
                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00713A15
                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00713A36
                      • ShowWindow.USER32(00000000,?,?), ref: 00713A4A
                      • ShowWindow.USER32(00000000,?,?), ref: 00713A53
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$CreateShow
                      • String ID: AutoIt v3$edit
                      • API String ID: 1584632944-3779509399
                      • Opcode ID: 95833b247dfb5eb88764604a0f514278fbceec3450184a073d7f56bb759515d8
                      • Instruction ID: 98d2ccd33d4b661541b29cb9dc60d2dc1a16e34e0d02bf55feaa0c72773d93c6
                      • Opcode Fuzzy Hash: 95833b247dfb5eb88764604a0f514278fbceec3450184a073d7f56bb759515d8
                      • Instruction Fuzzy Hash: 14F0DA716422907EEE3157676C49E672F7DE7C6F60B00812BF904E2170C6AE6851DAB8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1116 9f2410-9f2550 call 9f0000 call 9f2300 CreateFileW 1123 9f2557-9f2567 1116->1123 1124 9f2552 1116->1124 1127 9f256e-9f2588 VirtualAlloc 1123->1127 1128 9f2569 1123->1128 1125 9f2607-9f260c 1124->1125 1129 9f258c-9f25a3 ReadFile 1127->1129 1130 9f258a 1127->1130 1128->1125 1131 9f25a7-9f25e1 call 9f2340 call 9f1300 1129->1131 1132 9f25a5 1129->1132 1130->1125 1137 9f25fd-9f2605 ExitProcess 1131->1137 1138 9f25e3-9f25f8 call 9f2390 1131->1138 1132->1125 1137->1125 1138->1137
                      APIs
                        • Part of subcall function 009F2300: Sleep.KERNELBASE(000001F4), ref: 009F2311
                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 009F2546
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1677391334.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9f0000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CreateFileSleep
                      • String ID: XW0980Y0QA
                      • API String ID: 2694422964-2656154724
                      • Opcode ID: f550b63597ca92b39333c2c6ef888a3fb952b8b6a9a9be0862232264f395cafe
                      • Instruction ID: ac818028a7691e5648ebff0b2f6b68a0b97d11fa0d78690af51f987f83bce2ea
                      • Opcode Fuzzy Hash: f550b63597ca92b39333c2c6ef888a3fb952b8b6a9a9be0862232264f395cafe
                      • Instruction Fuzzy Hash: 7D51A130D1420CEBEF11DBA4C855BEEBB79EF58700F104599E209BB2C0D6B91B45CBA6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1140 71410d-714123 1141 714200-714204 1140->1141 1142 714129-71413e call 717b76 1140->1142 1145 714144-714164 call 717d2c 1142->1145 1146 74d5dd-74d5ec LoadStringW 1142->1146 1149 74d5f7-74d60f call 717c8e call 717143 1145->1149 1150 71416a-71416e 1145->1150 1146->1149 1159 71417e-7141fb call 733020 call 71463e call 732ffc Shell_NotifyIconW call 715a64 1149->1159 1162 74d615-74d633 call 717e0b call 717143 call 717e0b 1149->1162 1152 714205-71420e call 7181a7 1150->1152 1153 714174-714179 call 717c8e 1150->1153 1152->1159 1153->1159 1159->1141 1162->1159
                      APIs
                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0074D5EC
                        • Part of subcall function 00717D2C: _memmove.LIBCMT ref: 00717D66
                      • _memset.LIBCMT ref: 0071418D
                      • _wcscpy.LIBCMT ref: 007141E1
                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007141F1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                      • String ID: Line:
                      • API String ID: 3942752672-1585850449
                      • Opcode ID: c56da3f535e5d5898975fec9e72cf7b4e145006fa4a48a6d213303cb7288dd3c
                      • Instruction ID: 84d115a874aabcf0eddda5920c36f4197374df8c49598da0f05bd3ccdf23c940
                      • Opcode Fuzzy Hash: c56da3f535e5d5898975fec9e72cf7b4e145006fa4a48a6d213303cb7288dd3c
                      • Instruction Fuzzy Hash: CB31A471009308AAD725EB68DC4AFDB77F8BF44310F10851EF195920E1EB7CAA88C796
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                      • String ID:
                      • API String ID: 1559183368-0
                      • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                      • Instruction ID: 027e58a2b979e6ae166ef17770a823680b4833ad883ec3ea58ed3a68e85dd374
                      • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                      • Instruction Fuzzy Hash: D551B331A00B05DFFB249FB9C88566EB7B5AF40720F648729F835972D2D7789D508B50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00714F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,007D62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00714F6F
                      • _free.LIBCMT ref: 0074E68C
                      • _free.LIBCMT ref: 0074E6D3
                        • Part of subcall function 00716BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00716D0D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _free$CurrentDirectoryLibraryLoad
                      • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                      • API String ID: 2861923089-1757145024
                      • Opcode ID: 745c9b50e63e6ec5df597d2333ea51173fcdb9d14604782338f712091e387412
                      • Instruction ID: 6dd76ea4da5c43c86bb8099af08dd18642567c0ff8c79ff2a40c0a6fa90f83b8
                      • Opcode Fuzzy Hash: 745c9b50e63e6ec5df597d2333ea51173fcdb9d14604782338f712091e387412
                      • Instruction Fuzzy Hash: BA918071910219EFCF08EFA8CC959EDB7B8FF14324F144469F815AB291EB38A955CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,007135A1,SwapMouseButtons,00000004,?), ref: 007135D4
                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,007135A1,SwapMouseButtons,00000004,?,?,?,?,00712754), ref: 007135F5
                      • RegCloseKey.KERNELBASE(00000000,?,?,007135A1,SwapMouseButtons,00000004,?,?,?,?,00712754), ref: 00713617
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID: Control Panel\Mouse
                      • API String ID: 3677997916-824357125
                      • Opcode ID: ba155c859101af905f1bb0a011c8c84b889223af4ff04956d7992a485a0d7639
                      • Instruction ID: 67008697009031610b9e2f83ecbb461297fea23ac2afde32a1e632380f22aacf
                      • Opcode Fuzzy Hash: ba155c859101af905f1bb0a011c8c84b889223af4ff04956d7992a485a0d7639
                      • Instruction Fuzzy Hash: F61145B1610208BFDB20CF68DC80EEEBBBCEF44740F00846AE805D7250E2759E959BA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateProcessW.KERNELBASE(?,00000000), ref: 009F1B2D
                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 009F1B51
                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 009F1B73
                      Memory Dump Source
                      • Source File: 00000000.00000002.1677391334.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9f0000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                      • String ID:
                      • API String ID: 2438371351-0
                      • Opcode ID: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                      • Instruction ID: e55e8ae45a7d58f3a74b6f78ce9590e1c0efbd3ef62e5b381b59e9f563add80f
                      • Opcode Fuzzy Hash: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                      • Instruction Fuzzy Hash: 4E621030A14258DBEB24CFA4C841BEEB375EF58300F1095A9D20DEB394E7799E81CB59
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00715045: _fseek.LIBCMT ref: 0071505D
                        • Part of subcall function 007799BE: _wcscmp.LIBCMT ref: 00779AAE
                        • Part of subcall function 007799BE: _wcscmp.LIBCMT ref: 00779AC1
                      • _free.LIBCMT ref: 0077992C
                      • _free.LIBCMT ref: 00779933
                      • _free.LIBCMT ref: 0077999E
                        • Part of subcall function 00732F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00739C64), ref: 00732FA9
                        • Part of subcall function 00732F95: GetLastError.KERNEL32(00000000,?,00739C64), ref: 00732FBB
                      • _free.LIBCMT ref: 007799A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                      • String ID:
                      • API String ID: 1552873950-0
                      • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                      • Instruction ID: 3f6f066a6f8a1fa6632e80ed2bab1351ed37a74ad0f2831a4c65856b283f9a05
                      • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                      • Instruction Fuzzy Hash: 745150B1904618EFDF249F64CC45AAEBB79EF48310F1044AEB60DA7281DB755E80CF59
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                      • String ID:
                      • API String ID: 2782032738-0
                      • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                      • Instruction ID: d1acdd56195f50a52c1c051f29e54408ca60dd3ff9ad8ede6d0e2b71b58e163d
                      • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                      • Instruction Fuzzy Hash: BA41A571640705ABFB2C8EA9C884A6F7BA9EF84360F24C16DE855C7652D778BD408B44
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: AU3!P/z$EA06
                      • API String ID: 4104443479-4042330639
                      • Opcode ID: 543440db10164ef8f0188fd28d728ce5b9bdff8af5d7fa9db03106066745b90a
                      • Instruction ID: 5840a2dac54e42dc8becf199c56be6e6dcd67737853aeff6d906a730e0abe634
                      • Opcode Fuzzy Hash: 543440db10164ef8f0188fd28d728ce5b9bdff8af5d7fa9db03106066745b90a
                      • Instruction Fuzzy Hash: C3418D71A04154DBDF255B6C8896BFE7FA6AB45300F684065E882AB2C2C63D8DC887E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 0074EE62
                      • GetOpenFileNameW.COMDLG32(?), ref: 0074EEAC
                        • Part of subcall function 007148AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007148A1,?,?,007137C0,?), ref: 007148CE
                        • Part of subcall function 007309D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007309F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Name$Path$FileFullLongOpen_memset
                      • String ID: X
                      • API String ID: 3777226403-3081909835
                      • Opcode ID: 7ff2619218b1740c42d8a47121965d5a3524f5754cfaa895cfcd08142718fb5e
                      • Instruction ID: a2bd39bbb44d2aa48e22f93c10ca019d704ef09b9d921d4620ef90ce53c4acf7
                      • Opcode Fuzzy Hash: 7ff2619218b1740c42d8a47121965d5a3524f5754cfaa895cfcd08142718fb5e
                      • Instruction Fuzzy Hash: A221A471A1025CDBDB55DF98C849BEE7BF8AF49710F00805AE508E7281DBBC5989CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __fread_nolock_memmove
                      • String ID: EA06
                      • API String ID: 1988441806-3962188686
                      • Opcode ID: 3af78ee70b20a7d829ea738bc5c41e4a1983ac8b28adc74026eb53848d058c48
                      • Instruction ID: 6e447b068d1d32eab01cb4fd23248377f884978e3e3fd671342ea9b2d8d84390
                      • Opcode Fuzzy Hash: 3af78ee70b20a7d829ea738bc5c41e4a1983ac8b28adc74026eb53848d058c48
                      • Instruction Fuzzy Hash: B201B971914258BEDB28C6A8C85AFEEBBF8DB15301F00419EF556D2181E579A704C760
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetTempPathW.KERNEL32(00000104,?), ref: 00779B82
                      • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00779B99
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Temp$FileNamePath
                      • String ID: aut
                      • API String ID: 3285503233-3010740371
                      • Opcode ID: e4767099f1a5ca9adc1af37e6f0a24811542baa2aaf88f1f7aa3705124cf6458
                      • Instruction ID: 058adde6a4c0eca7e4a8ef497ca98d68d640b913086ac00ef2e6040d8c0f76f7
                      • Opcode Fuzzy Hash: e4767099f1a5ca9adc1af37e6f0a24811542baa2aaf88f1f7aa3705124cf6458
                      • Instruction Fuzzy Hash: B7D05E7954030EBBDB10AB94DC0EF9A772CE704705F0082A2FE54D10A1DEB896998B99
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9b28746b74fb2f0da86e39916b35db34d71c710cfaa23e6d73453de21b5628ba
                      • Instruction ID: ceee294dac3a68cb985211f0e94e29332b85a72f71e40e71546f981f6968c00d
                      • Opcode Fuzzy Hash: 9b28746b74fb2f0da86e39916b35db34d71c710cfaa23e6d73453de21b5628ba
                      • Instruction Fuzzy Hash: 16F11771508305DFC724EF28C494A6ABBE5BF88314F14892EF8999B291D735ED46CF82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 00714401
                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 007144A6
                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 007144C3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: IconNotifyShell_$_memset
                      • String ID:
                      • API String ID: 1505330794-0
                      • Opcode ID: 0195596d92e8590c66ba4ce871c0657b69cd97d9e2b2262288d6dc08ff415221
                      • Instruction ID: c0eb0b92f7abdeeda7a397d015ad635b22930e07137a121a3e5e46a99d2b739c
                      • Opcode Fuzzy Hash: 0195596d92e8590c66ba4ce871c0657b69cd97d9e2b2262288d6dc08ff415221
                      • Instruction Fuzzy Hash: 0F318EB05053418FD720DF68D884A9BBBF8BB48704F00492EE99AC3291D779A984CB96
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __FF_MSGBANNER.LIBCMT ref: 00735963
                        • Part of subcall function 0073A3AB: __NMSG_WRITE.LIBCMT ref: 0073A3D2
                        • Part of subcall function 0073A3AB: __NMSG_WRITE.LIBCMT ref: 0073A3DC
                      • __NMSG_WRITE.LIBCMT ref: 0073596A
                        • Part of subcall function 0073A408: GetModuleFileNameW.KERNEL32(00000000,007D43BA,00000104,?,00000001,00000000), ref: 0073A49A
                        • Part of subcall function 0073A408: ___crtMessageBoxW.LIBCMT ref: 0073A548
                        • Part of subcall function 007332DF: ___crtCorExitProcess.LIBCMT ref: 007332E5
                        • Part of subcall function 007332DF: ExitProcess.KERNEL32 ref: 007332EE
                        • Part of subcall function 00738D68: __getptd_noexit.LIBCMT ref: 00738D68
                      • RtlAllocateHeap.NTDLL(011D0000,00000000,00000001,00000000,?,?,?,00731013,?), ref: 0073598F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                      • String ID:
                      • API String ID: 1372826849-0
                      • Opcode ID: 0e38e27e5d94b79bc4c5f225187ef23ba62025458a86828e476dc17d86325295
                      • Instruction ID: 9fc051acede82c00817dd61e16adebc2360be764f9a8a6517c37efbdbab41111
                      • Opcode Fuzzy Hash: 0e38e27e5d94b79bc4c5f225187ef23ba62025458a86828e476dc17d86325295
                      • Instruction Fuzzy Hash: F401F132301B15EFF6212B34EC4AB6E73989F42730F50012AF840AA2C3DE7CBD018665
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,007797D2,?,?,?,?,?,00000004), ref: 00779B45
                      • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,007797D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00779B5B
                      • CloseHandle.KERNEL32(00000000,?,007797D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00779B62
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: File$CloseCreateHandleTime
                      • String ID:
                      • API String ID: 3397143404-0
                      • Opcode ID: b1ff77b148ecb88b37ae13e8357d6ddd4076fe6670c82613f94574b94574e4c1
                      • Instruction ID: adbc814391f375160b6ffb78521a41942be1224c7bd6d03bcbb0f37d31fa321f
                      • Opcode Fuzzy Hash: b1ff77b148ecb88b37ae13e8357d6ddd4076fe6670c82613f94574b94574e4c1
                      • Instruction Fuzzy Hash: D9E08632181218F7DB211B64EC0AFCA7F18EB05765F10C121FB14A90E087B5251297DC
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _free.LIBCMT ref: 00778FA5
                        • Part of subcall function 00732F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00739C64), ref: 00732FA9
                        • Part of subcall function 00732F95: GetLastError.KERNEL32(00000000,?,00739C64), ref: 00732FBB
                      • _free.LIBCMT ref: 00778FB6
                      • _free.LIBCMT ref: 00778FC8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                      • Instruction ID: b2edf946cc6bfbfe960f172fa7d39f9d160cbb3e2efa7ff17ef7a2ce299a39dd
                      • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                      • Instruction Fuzzy Hash: 06E012B16097028ADE64A578ED48AA357EE5F483A0F28081DF40DDB143DE2CE8428125
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID: CALL
                      • API String ID: 0-4196123274
                      • Opcode ID: f140be4da944a2dac1a1d652e71e70734cbfb1a0893730ec899f99f15fbcecfb
                      • Instruction ID: 26f13618656365e233ca2342ea711ce0b95cdb27a133fe8f233a9028612d64e7
                      • Opcode Fuzzy Hash: f140be4da944a2dac1a1d652e71e70734cbfb1a0893730ec899f99f15fbcecfb
                      • Instruction Fuzzy Hash: 91223A70609341DFD728DF18C494BAAB7F1BF45300F14895DE88A8B2A2D779ED85CB82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • IsThemeActive.UXTHEME ref: 00714992
                        • Part of subcall function 007335AC: __lock.LIBCMT ref: 007335B2
                        • Part of subcall function 007335AC: DecodePointer.KERNEL32(00000001,?,007149A7,007681BC), ref: 007335BE
                        • Part of subcall function 007335AC: EncodePointer.KERNEL32(?,?,007149A7,007681BC), ref: 007335C9
                        • Part of subcall function 00714A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00714A73
                        • Part of subcall function 00714A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00714A88
                        • Part of subcall function 00713B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00713B7A
                        • Part of subcall function 00713B4C: IsDebuggerPresent.KERNEL32 ref: 00713B8C
                        • Part of subcall function 00713B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,007D62F8,007D62E0,?,?), ref: 00713BFD
                        • Part of subcall function 00713B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00713C81
                      • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 007149D2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                      • String ID:
                      • API String ID: 1438897964-0
                      • Opcode ID: 4dfb2f25d2a6500838a30fc5961e8dcf668e9a3d75642c162bcb4c497cc4beea
                      • Instruction ID: a197dacfc807f1183ba61e669c03eb474259a3d2a7689ce4dd62adb9653559c5
                      • Opcode Fuzzy Hash: 4dfb2f25d2a6500838a30fc5961e8dcf668e9a3d75642c162bcb4c497cc4beea
                      • Instruction Fuzzy Hash: 90118C719093119BC700EF28DC0994ABFF8FF98710F00851FF485972A1DB78A589CB9A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00715981,?,?,?,?), ref: 00715E27
                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00715981,?,?,?,?), ref: 0074E19C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 5b50e20a17203bb49d0f3d6b56956da40a6a1103ab6437bfb9979d8a1c8d73b3
                      • Instruction ID: f121701dd516bdf2b29495a7ced6cb83525d01a38e947281b6d0ceb7b6a7c903
                      • Opcode Fuzzy Hash: 5b50e20a17203bb49d0f3d6b56956da40a6a1103ab6437bfb9979d8a1c8d73b3
                      • Instruction Fuzzy Hash: 60015670684708FEF7680E18CC8AFA6369CAB05768F108319FAE55E1D0C6B85D898B54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 0073594C: __FF_MSGBANNER.LIBCMT ref: 00735963
                        • Part of subcall function 0073594C: __NMSG_WRITE.LIBCMT ref: 0073596A
                        • Part of subcall function 0073594C: RtlAllocateHeap.NTDLL(011D0000,00000000,00000001,00000000,?,?,?,00731013,?), ref: 0073598F
                      • std::exception::exception.LIBCMT ref: 0073102C
                      • __CxxThrowException@8.LIBCMT ref: 00731041
                        • Part of subcall function 007387DB: RaiseException.KERNEL32(?,?,?,007CBAF8,00000000,?,?,?,?,00731046,?,007CBAF8,?,00000001), ref: 00738830
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                      • String ID:
                      • API String ID: 3902256705-0
                      • Opcode ID: 839d619a2edd573546bd7010c1b96973ce1071aae153c16f2d1aff47dd1c2d02
                      • Instruction ID: 5ecc51d4eb0b2c354ad5d5a9ea0d0539ddea30dd478106b3df10e0371fbed932
                      • Opcode Fuzzy Hash: 839d619a2edd573546bd7010c1b96973ce1071aae153c16f2d1aff47dd1c2d02
                      • Instruction Fuzzy Hash: 13F02D3560031DE6E724BA98DC0AADF77AC9F01350F600125F80491543DF789A8182D1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __lock_file_memset
                      • String ID:
                      • API String ID: 26237723-0
                      • Opcode ID: 9b42fba78e0fba859971e4b96143de8b07e878ff30fc515e61644df8ec07e432
                      • Instruction ID: 17e4537f3b9be3f7052793ea23ce49cb3bbb69b3d64c637e568d3736258b95a1
                      • Opcode Fuzzy Hash: 9b42fba78e0fba859971e4b96143de8b07e878ff30fc515e61644df8ec07e432
                      • Instruction Fuzzy Hash: 4D01A771C00719EBEF22AF698C0A9DF7B61AF40360F148215F8145B1A3DB3D8A51DB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00738D68: __getptd_noexit.LIBCMT ref: 00738D68
                      • __lock_file.LIBCMT ref: 0073561B
                        • Part of subcall function 00736E4E: __lock.LIBCMT ref: 00736E71
                      • __fclose_nolock.LIBCMT ref: 00735626
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                      • String ID:
                      • API String ID: 2800547568-0
                      • Opcode ID: e6617131a974fd1f39ae9269935bb78c1e5cee93956dc0ed2d93505839741314
                      • Instruction ID: e29552a4254b674d7831262297d5f536ac5248543e05f0281e67b5bde9227de9
                      • Opcode Fuzzy Hash: e6617131a974fd1f39ae9269935bb78c1e5cee93956dc0ed2d93505839741314
                      • Instruction Fuzzy Hash: 25F024B1900B11DAF760AF34880B76EB7A12F00B30F548209B810AB0C3CF7C8A018B92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateProcessW.KERNELBASE(?,00000000), ref: 009F1B2D
                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 009F1B51
                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 009F1B73
                      Memory Dump Source
                      • Source File: 00000000.00000002.1677391334.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9f0000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                      • String ID:
                      • API String ID: 2438371351-0
                      • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                      • Instruction ID: 56a7648bd3bce10dd383d8cf6ac28ffdcce187c07c397cc3b350172f46252412
                      • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                      • Instruction Fuzzy Hash: 2B12EE24E24658C6EB24DF64D8507DEB232EF68300F1091E9910DEB7A5E77A4F81CF5A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9197dacc89277a8bc7123a6e4d66504cf92be22350c6f8ee3f5734c203d256ca
                      • Instruction ID: 2390739cc335e61fb8997123551741a4bb831657d42716c7827202bf0081e4bd
                      • Opcode Fuzzy Hash: 9197dacc89277a8bc7123a6e4d66504cf92be22350c6f8ee3f5734c203d256ca
                      • Instruction Fuzzy Hash: AE519134700614EFCF18EB68C999EAE77A5AF84310F148168F946AB3C2DB38ED45CB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00715CF6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: FilePointer
                      • String ID:
                      • API String ID: 973152223-0
                      • Opcode ID: 9c48e6428264546b152789f3b229d7e28545e88d4f775441e06bac0dba5d234b
                      • Instruction ID: fb80037d3d7a3ce5fc3f1b9abc7681fb2bb3b21efce6144ea1d24664e8abd7cc
                      • Opcode Fuzzy Hash: 9c48e6428264546b152789f3b229d7e28545e88d4f775441e06bac0dba5d234b
                      • Instruction Fuzzy Hash: 70313C71A00B0AEFCB18DF2DD48469DB7B5FF88310F148629D81993750D775A9A0DBD0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ClearVariant
                      • String ID:
                      • API String ID: 1473721057-0
                      • Opcode ID: 34a00fb692fc4aab284c264018ff80a83a1e774d1e9e5d922186a5cd4bb5dd13
                      • Instruction ID: 945bbcb482ca37cba14042d8831284b490fdd52e9b529c8f62da6cfbda1c6527
                      • Opcode Fuzzy Hash: 34a00fb692fc4aab284c264018ff80a83a1e774d1e9e5d922186a5cd4bb5dd13
                      • Instruction Fuzzy Hash: 91412E74604751DFDB14DF18C484B5ABBE0BF45314F19885CE8854B3A2C379EC89CB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID:
                      • API String ID: 4104443479-0
                      • Opcode ID: 64602025b210a69d44d795642d596fdfc93abb49ffaa1266944914acc7b2a18e
                      • Instruction ID: 5b1c9e8f19d10afd908392563e0d3bb8a3d3cea9671790f88d0ecc600e022052
                      • Opcode Fuzzy Hash: 64602025b210a69d44d795642d596fdfc93abb49ffaa1266944914acc7b2a18e
                      • Instruction Fuzzy Hash: 2611D332209205AFD718DF2CC885CAEB7A9EF45324724851AF915DB2E1DB36EC95C7D0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00714D13: FreeLibrary.KERNEL32(00000000,?), ref: 00714D4D
                        • Part of subcall function 0073548B: __wfsopen.LIBCMT ref: 00735496
                      • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,007D62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00714F6F
                        • Part of subcall function 00714CC8: FreeLibrary.KERNEL32(00000000), ref: 00714D02
                        • Part of subcall function 00714DD0: _memmove.LIBCMT ref: 00714E1A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Library$Free$Load__wfsopen_memmove
                      • String ID:
                      • API String ID: 1396898556-0
                      • Opcode ID: 3978f7fbb3029ed37b9bdcbd6cfde403d8e662bc974a70a790116bc2fae252f9
                      • Instruction ID: c1eb1dda257de31a539fa97f54cacca3c1f619af3d4fff9d75a52255e45d5ef0
                      • Opcode Fuzzy Hash: 3978f7fbb3029ed37b9bdcbd6cfde403d8e662bc974a70a790116bc2fae252f9
                      • Instruction Fuzzy Hash: CB11EB32700605EACF24AF78DC0ABEE77A89F44B10F208429F541962C1DB7D9A459BA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ClearVariant
                      • String ID:
                      • API String ID: 1473721057-0
                      • Opcode ID: 8731b3063c8353c9fcd4ce2198cc804f33437c32b5970a4d16ff07a7c01d1cbb
                      • Instruction ID: 1688dcecb0f5f2b5e1e9da37f82c9ec95dc41ca0b65a5d9ab1b4999a3d194ec8
                      • Opcode Fuzzy Hash: 8731b3063c8353c9fcd4ce2198cc804f33437c32b5970a4d16ff07a7c01d1cbb
                      • Instruction Fuzzy Hash: F8212774608341DFDB14DF68C449B5ABBE0BF84314F04896CE98997762D739E889CB53
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00715807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00715D76
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: FileRead
                      • String ID:
                      • API String ID: 2738559852-0
                      • Opcode ID: 18e7d880abe89e0c372adf085db267baac7443ebdd977eaff9b6cd0c039fd1a6
                      • Instruction ID: c4c4c3ab15ee3442d02c7894ba80da24ed904e6a90f5eddecba1b15e20787107
                      • Opcode Fuzzy Hash: 18e7d880abe89e0c372adf085db267baac7443ebdd977eaff9b6cd0c039fd1a6
                      • Instruction Fuzzy Hash: AE113A71200B05DFD3348F19E488BA2B7F5EF85750F10C92EE4EA86A90D778E985CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __lock_file.LIBCMT ref: 00734AD6
                        • Part of subcall function 00738D68: __getptd_noexit.LIBCMT ref: 00738D68
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __getptd_noexit__lock_file
                      • String ID:
                      • API String ID: 2597487223-0
                      • Opcode ID: 24aa173f1ba00294793fd7250db238d69648673c74ebc536834f74547e6fd2a2
                      • Instruction ID: e865f7bc8f78c03c2f3e36f12f8a4fe3c59fddef83561fcfad77bfdeaf59b6b4
                      • Opcode Fuzzy Hash: 24aa173f1ba00294793fd7250db238d69648673c74ebc536834f74547e6fd2a2
                      • Instruction Fuzzy Hash: 86F0AF71940309EBFFA5AF748C0A79E77A1AF00325F088518B424AA1D3CB7C9E50DF52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FreeLibrary.KERNEL32(?,?,007D62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00714FDE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: ca6e06013701ec88f613827d71b39371e7709bc1b472342c4f928691217150f1
                      • Instruction ID: 32e71bb21eb5405a36428703d059d665bfee1c7bf9f334f685efff24b54d32f9
                      • Opcode Fuzzy Hash: ca6e06013701ec88f613827d71b39371e7709bc1b472342c4f928691217150f1
                      • Instruction Fuzzy Hash: 81F03971105712CFCB349F68E494892BBEABF043293288A3EE1D682750C739A896DF40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007309F4
                        • Part of subcall function 00717D2C: _memmove.LIBCMT ref: 00717D66
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: LongNamePath_memmove
                      • String ID:
                      • API String ID: 2514874351-0
                      • Opcode ID: 2916f1eeeb58c33f9fb1f8d456545d929d7d3efeaa68a1feb2a0f3de7a4996a3
                      • Instruction ID: 120efebe9fec100515e3b62943d1ce11cb162773f98b93307ca05091e506be4b
                      • Opcode Fuzzy Hash: 2916f1eeeb58c33f9fb1f8d456545d929d7d3efeaa68a1feb2a0f3de7a4996a3
                      • Instruction Fuzzy Hash: 3AE08676A0422897C720E6989C09FFA77ADDF89690F0441B6FC4CD7244D9649C818690
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __fread_nolock
                      • String ID:
                      • API String ID: 2638373210-0
                      • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                      • Instruction ID: 60fff7ce401489350a2a2349cc615468564296bd710d7b1497a5f0e7430830bc
                      • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                      • Instruction Fuzzy Hash: 67E09AB0204B049FEB388A28D815BE373E0AB06315F00081CF2AA83342EB66B8418B59
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,0074E16B,?,?,00000000), ref: 00715DBF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: FilePointer
                      • String ID:
                      • API String ID: 973152223-0
                      • Opcode ID: a7bdfd7372abf88f976528276f4565a5e88cdd9c43778b8dc9eeba454d6bb0b7
                      • Instruction ID: 478e6a25d5583aa1954d821e092800e0aa6b8d44aca48f2596c045dd6f8af080
                      • Opcode Fuzzy Hash: a7bdfd7372abf88f976528276f4565a5e88cdd9c43778b8dc9eeba454d6bb0b7
                      • Instruction Fuzzy Hash: 77D0C77464020CBFE710DB80DC46FA9777CD705710F100195FD0496290D6B27D508795
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __wfsopen
                      • String ID:
                      • API String ID: 197181222-0
                      • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                      • Instruction ID: 0522bf87071d5eef9d1d1a4665696a8ba970ff8a2a58780e98e60710d68eb050
                      • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                      • Instruction Fuzzy Hash: AFB0927684020CB7EE012E82EC02A593B199B40678F808020FB0C18162A677A6A09689
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetLastError.KERNEL32(00000002,00000000), ref: 0077D46A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ErrorLast
                      • String ID:
                      • API String ID: 1452528299-0
                      • Opcode ID: a5a978b6bf738a834cb6ddf1b5b50daef2e0a494979d178d3be99438fa96df8e
                      • Instruction ID: 4e0972e8bbed397d4817d26fd06cdb4612761cb23bb2f17b88e3c1d93d13e73f
                      • Opcode Fuzzy Hash: a5a978b6bf738a834cb6ddf1b5b50daef2e0a494979d178d3be99438fa96df8e
                      • Instruction Fuzzy Hash: 1B714530204341CFCB14EF28C495AAAB7F5AF88354F04856DF99A972D2DB38ED45CB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                      • Instruction ID: 6b21c31bf2388ae315c1192f33e441ee9f43eaaad091bc98797c2f9e0440de37
                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                      • Instruction Fuzzy Hash: 1A31D275A4010ADFE718EF58C4A0969F7A6FF59300F688AA5E409CB652D739EDC1CBC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • Sleep.KERNELBASE(000001F4), ref: 009F2311
                      Memory Dump Source
                      • Source File: 00000000.00000002.1677391334.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9f0000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Sleep
                      • String ID:
                      • API String ID: 3472027048-0
                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                      • Instruction ID: f998c3016a4e63b8dbd1033054c637ef1b86b2a95834c0391933eff3b83bf46f
                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                      • Instruction Fuzzy Hash: CBE0E67494110EDFDB00EFB4D5496AE7FB4EF04701F100561FD01D2280D6709D508A62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00712612: GetWindowLongW.USER32(?,000000EB), ref: 00712623
                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0079CE50
                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0079CE91
                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0079CED6
                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0079CF00
                      • SendMessageW.USER32 ref: 0079CF29
                      • _wcsncpy.LIBCMT ref: 0079CFA1
                      • GetKeyState.USER32(00000011), ref: 0079CFC2
                      • GetKeyState.USER32(00000009), ref: 0079CFCF
                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0079CFE5
                      • GetKeyState.USER32(00000010), ref: 0079CFEF
                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0079D018
                      • SendMessageW.USER32 ref: 0079D03F
                      • SendMessageW.USER32(?,00001030,?,0079B602), ref: 0079D145
                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0079D15B
                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0079D16E
                      • SetCapture.USER32(?), ref: 0079D177
                      • ClientToScreen.USER32(?,?), ref: 0079D1DC
                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0079D1E9
                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0079D203
                      • ReleaseCapture.USER32 ref: 0079D20E
                      • GetCursorPos.USER32(?), ref: 0079D248
                      • ScreenToClient.USER32(?,?), ref: 0079D255
                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0079D2B1
                      • SendMessageW.USER32 ref: 0079D2DF
                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0079D31C
                      • SendMessageW.USER32 ref: 0079D34B
                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0079D36C
                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0079D37B
                      • GetCursorPos.USER32(?), ref: 0079D39B
                      • ScreenToClient.USER32(?,?), ref: 0079D3A8
                      • GetParent.USER32(?), ref: 0079D3C8
                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0079D431
                      • SendMessageW.USER32 ref: 0079D462
                      • ClientToScreen.USER32(?,?), ref: 0079D4C0
                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0079D4F0
                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0079D51A
                      • SendMessageW.USER32 ref: 0079D53D
                      • ClientToScreen.USER32(?,?), ref: 0079D58F
                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0079D5C3
                        • Part of subcall function 007125DB: GetWindowLongW.USER32(?,000000EB), ref: 007125EC
                      • GetWindowLongW.USER32(?,000000F0), ref: 0079D65F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                      • String ID: @GUI_DRAGID$F$pr}
                      • API String ID: 3977979337-1713234969
                      • Opcode ID: 74cd96098435f8a95f05d55273be952f006eb21d77f0224b97b982ebaad19f35
                      • Instruction ID: 4d17f867977fbc06b85095a74b53403e4e23e5fad1115418690b78d15352effa
                      • Opcode Fuzzy Hash: 74cd96098435f8a95f05d55273be952f006eb21d77f0224b97b982ebaad19f35
                      • Instruction Fuzzy Hash: 8F42AC30204340EFDF21CF28D858AAABBE6FF49314F14451EF6968B2A1C7399851DB96
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0079873F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: %d/%02d/%02d
                      • API String ID: 3850602802-328681919
                      • Opcode ID: 345081d8daba69559e75c7cdb4d1f1876e59727bb92bae80681a1424b9134d35
                      • Instruction ID: 8e0c7bee5fc87dc1db008c6365e001a8bd7ca06ddf96ee854f2af5e6982b07de
                      • Opcode Fuzzy Hash: 345081d8daba69559e75c7cdb4d1f1876e59727bb92bae80681a1424b9134d35
                      • Instruction Fuzzy Hash: 9612D171500208ABEF658F74EC49FAE7BB9EF46710F24412AF915EA2E1DF788941CB11
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memmove$_memset
                      • String ID: 0w|$DEFINE$Oar$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                      • API String ID: 1357608183-542029135
                      • Opcode ID: f9e3385d85c05969ff76e74873ea894afb42bfb940125b36e3aa03fdb24916ab
                      • Instruction ID: acc240cfc579df97ab1296b1cdf9329192d4121ee9d1be1a324141fbdc392cfe
                      • Opcode Fuzzy Hash: f9e3385d85c05969ff76e74873ea894afb42bfb940125b36e3aa03fdb24916ab
                      • Instruction Fuzzy Hash: 5E93A371A04215DFDB28CF58D981BADB7B1FF48310F24816AED46AB281E7789E81CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetForegroundWindow.USER32(00000000,?), ref: 00714A3D
                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0074DA8E
                      • IsIconic.USER32(?), ref: 0074DA97
                      • ShowWindow.USER32(?,00000009), ref: 0074DAA4
                      • SetForegroundWindow.USER32(?), ref: 0074DAAE
                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0074DAC4
                      • GetCurrentThreadId.KERNEL32 ref: 0074DACB
                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0074DAD7
                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0074DAE8
                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0074DAF0
                      • AttachThreadInput.USER32(00000000,?,00000001), ref: 0074DAF8
                      • SetForegroundWindow.USER32(?), ref: 0074DAFB
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0074DB10
                      • keybd_event.USER32(00000012,00000000), ref: 0074DB1B
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0074DB25
                      • keybd_event.USER32(00000012,00000000), ref: 0074DB2A
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0074DB33
                      • keybd_event.USER32(00000012,00000000), ref: 0074DB38
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0074DB42
                      • keybd_event.USER32(00000012,00000000), ref: 0074DB47
                      • SetForegroundWindow.USER32(?), ref: 0074DB4A
                      • AttachThreadInput.USER32(?,?,00000000), ref: 0074DB71
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                      • String ID: Shell_TrayWnd
                      • API String ID: 4125248594-2988720461
                      • Opcode ID: 3d881111a58f04a2ac1146e182525d199e6c0672f936dcfe2e61d9838dbaaa5a
                      • Instruction ID: 7cd25b3a8da504632019e0e1194c64859e56a7ed14e31c400823d61e31dfe22a
                      • Opcode Fuzzy Hash: 3d881111a58f04a2ac1146e182525d199e6c0672f936dcfe2e61d9838dbaaa5a
                      • Instruction Fuzzy Hash: 19316571A40318BBEB316FA19C49F7F3E6CEB44B50F118026FA04EA1D0C6B85D11EBA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00768CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00768D0D
                        • Part of subcall function 00768CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00768D3A
                        • Part of subcall function 00768CC3: GetLastError.KERNEL32 ref: 00768D47
                      • _memset.LIBCMT ref: 0076889B
                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 007688ED
                      • CloseHandle.KERNEL32(?), ref: 007688FE
                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00768915
                      • GetProcessWindowStation.USER32 ref: 0076892E
                      • SetProcessWindowStation.USER32(00000000), ref: 00768938
                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00768952
                        • Part of subcall function 00768713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00768851), ref: 00768728
                        • Part of subcall function 00768713: CloseHandle.KERNEL32(?,?,00768851), ref: 0076873A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                      • String ID: $default$winsta0
                      • API String ID: 2063423040-1027155976
                      • Opcode ID: 63c9417c1173cbfc5d23725a57f22f3a6a30126ae7a2b17baccdb7775bd8107b
                      • Instruction ID: fa1d98b2139ebddb514be362a1f6c0069846cfb7dab9135608e42a1fc55286f1
                      • Opcode Fuzzy Hash: 63c9417c1173cbfc5d23725a57f22f3a6a30126ae7a2b17baccdb7775bd8107b
                      • Instruction Fuzzy Hash: 2E818EB1900209AFDF51DFE4DC49AEE7B78EF04304F08826AFD11A2261DB398E15DB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • OpenClipboard.USER32(0079F910), ref: 00784284
                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 00784292
                      • GetClipboardData.USER32(0000000D), ref: 0078429A
                      • CloseClipboard.USER32 ref: 007842A6
                      • GlobalLock.KERNEL32(00000000), ref: 007842C2
                      • CloseClipboard.USER32 ref: 007842CC
                      • GlobalUnlock.KERNEL32(00000000,00000000), ref: 007842E1
                      • IsClipboardFormatAvailable.USER32(00000001), ref: 007842EE
                      • GetClipboardData.USER32(00000001), ref: 007842F6
                      • GlobalLock.KERNEL32(00000000), ref: 00784303
                      • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00784337
                      • CloseClipboard.USER32 ref: 00784447
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                      • String ID:
                      • API String ID: 3222323430-0
                      • Opcode ID: 4c4584c2a7d9df47daf2e29423635ee2d1a974ed9fb75268f5c72a60a66f7386
                      • Instruction ID: 65048fa16b46d2a3b712f449f2a9ac3d4121b7552be063d8d037dbbcbe8206a1
                      • Opcode Fuzzy Hash: 4c4584c2a7d9df47daf2e29423635ee2d1a974ed9fb75268f5c72a60a66f7386
                      • Instruction Fuzzy Hash: 4251C371244302ABD310FF64EC8AF6E77A8BF84B10F10852AF556D21E1DB78D905CB66
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindFirstFileW.KERNEL32(?,?), ref: 0077C9F8
                      • FindClose.KERNEL32(00000000), ref: 0077CA4C
                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0077CA71
                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0077CA88
                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0077CAAF
                      • __swprintf.LIBCMT ref: 0077CAFB
                      • __swprintf.LIBCMT ref: 0077CB3E
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                      • __swprintf.LIBCMT ref: 0077CB92
                        • Part of subcall function 007338D8: __woutput_l.LIBCMT ref: 00733931
                      • __swprintf.LIBCMT ref: 0077CBE0
                        • Part of subcall function 007338D8: __flsbuf.LIBCMT ref: 00733953
                        • Part of subcall function 007338D8: __flsbuf.LIBCMT ref: 0073396B
                      • __swprintf.LIBCMT ref: 0077CC2F
                      • __swprintf.LIBCMT ref: 0077CC7E
                      • __swprintf.LIBCMT ref: 0077CCCD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                      • API String ID: 3953360268-2428617273
                      • Opcode ID: 66ca414487428551c9e9aba490ea1a194b88e1d71fd1c8d970adf2dff40dd2b8
                      • Instruction ID: 6283b5a6645d92f66ce626844ec7bc3da904966e93de49352d0d3534af9636f9
                      • Opcode Fuzzy Hash: 66ca414487428551c9e9aba490ea1a194b88e1d71fd1c8d970adf2dff40dd2b8
                      • Instruction Fuzzy Hash: F3A13FB2508304EBC714EB64C89ADEFB7ECAF98701F40491DF586D3191EA38DA49C762
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 0077F221
                      • _wcscmp.LIBCMT ref: 0077F236
                      • _wcscmp.LIBCMT ref: 0077F24D
                      • GetFileAttributesW.KERNEL32(?), ref: 0077F25F
                      • SetFileAttributesW.KERNEL32(?,?), ref: 0077F279
                      • FindNextFileW.KERNEL32(00000000,?), ref: 0077F291
                      • FindClose.KERNEL32(00000000), ref: 0077F29C
                      • FindFirstFileW.KERNEL32(*.*,?), ref: 0077F2B8
                      • _wcscmp.LIBCMT ref: 0077F2DF
                      • _wcscmp.LIBCMT ref: 0077F2F6
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0077F308
                      • SetCurrentDirectoryW.KERNEL32(007CA5A0), ref: 0077F326
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0077F330
                      • FindClose.KERNEL32(00000000), ref: 0077F33D
                      • FindClose.KERNEL32(00000000), ref: 0077F34F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                      • String ID: *.*
                      • API String ID: 1803514871-438819550
                      • Opcode ID: 4d37d2ae28ef6596c4fc6555afbbe9f51b5bd5eef91da0e03bd80f2fd046c6e5
                      • Instruction ID: 5d4cde485b74e7ebf69ecda33289a96249f6d3596ec686d155ef6560c1eadbbb
                      • Opcode Fuzzy Hash: 4d37d2ae28ef6596c4fc6555afbbe9f51b5bd5eef91da0e03bd80f2fd046c6e5
                      • Instruction Fuzzy Hash: DD31A7765002196BDF10DBB4EC49FEE77ACAF083A1F14817AE818D3091DB3CDA45CA54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00790BDE
                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,0079F910,00000000,?,00000000,?,?), ref: 00790C4C
                      • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00790C94
                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00790D1D
                      • RegCloseKey.ADVAPI32(?), ref: 0079103D
                      • RegCloseKey.ADVAPI32(00000000), ref: 0079104A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Close$ConnectCreateRegistryValue
                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                      • API String ID: 536824911-966354055
                      • Opcode ID: b46f1141111112ed820a69bbe15d76dd39996b480914fc48eb619bac24d79a27
                      • Instruction ID: 12e25b260e4d5acde0f3d5862ad345f8023cd167d6d5a836713fb24ed06c7e13
                      • Opcode Fuzzy Hash: b46f1141111112ed820a69bbe15d76dd39996b480914fc48eb619bac24d79a27
                      • Instruction Fuzzy Hash: E3026B75200611DFCB14EF18D895E6AB7E5FF88710F04885DF99A9B2A2CB39ED41CB81
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 0077F37E
                      • _wcscmp.LIBCMT ref: 0077F393
                      • _wcscmp.LIBCMT ref: 0077F3AA
                        • Part of subcall function 007745C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007745DC
                      • FindNextFileW.KERNEL32(00000000,?), ref: 0077F3D9
                      • FindClose.KERNEL32(00000000), ref: 0077F3E4
                      • FindFirstFileW.KERNEL32(*.*,?), ref: 0077F400
                      • _wcscmp.LIBCMT ref: 0077F427
                      • _wcscmp.LIBCMT ref: 0077F43E
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0077F450
                      • SetCurrentDirectoryW.KERNEL32(007CA5A0), ref: 0077F46E
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0077F478
                      • FindClose.KERNEL32(00000000), ref: 0077F485
                      • FindClose.KERNEL32(00000000), ref: 0077F497
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                      • String ID: *.*
                      • API String ID: 1824444939-438819550
                      • Opcode ID: 3b090bbaa4d75fa78806fbf57cb22b029b34e7e9f683809749bce0ac4c919aea
                      • Instruction ID: 8c9d88266d718b249ba6bbd76be928b185414f0416070d5dd8451015b4cac106
                      • Opcode Fuzzy Hash: 3b090bbaa4d75fa78806fbf57cb22b029b34e7e9f683809749bce0ac4c919aea
                      • Instruction Fuzzy Hash: 8131D571501259ABDF209B74EC89EEE77AC9F093A4F14817AE818E30A0D73CDE55CA64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 0076874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00768766
                        • Part of subcall function 0076874A: GetLastError.KERNEL32(?,0076822A,?,?,?), ref: 00768770
                        • Part of subcall function 0076874A: GetProcessHeap.KERNEL32(00000008,?,?,0076822A,?,?,?), ref: 0076877F
                        • Part of subcall function 0076874A: HeapAlloc.KERNEL32(00000000,?,0076822A,?,?,?), ref: 00768786
                        • Part of subcall function 0076874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0076879D
                        • Part of subcall function 007687E7: GetProcessHeap.KERNEL32(00000008,00768240,00000000,00000000,?,00768240,?), ref: 007687F3
                        • Part of subcall function 007687E7: HeapAlloc.KERNEL32(00000000,?,00768240,?), ref: 007687FA
                        • Part of subcall function 007687E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00768240,?), ref: 0076880B
                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0076825B
                      • _memset.LIBCMT ref: 00768270
                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0076828F
                      • GetLengthSid.ADVAPI32(?), ref: 007682A0
                      • GetAce.ADVAPI32(?,00000000,?), ref: 007682DD
                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007682F9
                      • GetLengthSid.ADVAPI32(?), ref: 00768316
                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00768325
                      • HeapAlloc.KERNEL32(00000000), ref: 0076832C
                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0076834D
                      • CopySid.ADVAPI32(00000000), ref: 00768354
                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00768385
                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007683AB
                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007683BF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                      • String ID:
                      • API String ID: 3996160137-0
                      • Opcode ID: 3e25f1b78877105fd39960c1bf2a922805526f2047bb3ef0684d253383a5e5b4
                      • Instruction ID: f3251061cd046df963ecee7b60fad84d17e334ade6c83233cce7361c92480662
                      • Opcode Fuzzy Hash: 3e25f1b78877105fd39960c1bf2a922805526f2047bb3ef0684d253383a5e5b4
                      • Instruction Fuzzy Hash: 91613C71900209EFDF109F95DC45AAEBBB9FF04700F14826AE816E6291DB399A15CF61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oar$PJ{$UCP)$UTF)$UTF16)
                      • API String ID: 0-2957015068
                      • Opcode ID: 502e8e87bd64daecc9c6cc0b5f8cd3a8e81fad6f1176fd69d8230ebf37e072e8
                      • Instruction ID: 4f13de863f8d3fd129e6b006bd2be2e9f45b7e565c035ee7a269d9c3ed35e0a4
                      • Opcode Fuzzy Hash: 502e8e87bd64daecc9c6cc0b5f8cd3a8e81fad6f1176fd69d8230ebf37e072e8
                      • Instruction Fuzzy Hash: 20728475E00229DBDF24CF58D8847AEB7B5FF48310F54816AE846EB291DB789D81CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 007910A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00790038,?,?), ref: 007910BC
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00790737
                        • Part of subcall function 00719997: __itow.LIBCMT ref: 007199C2
                        • Part of subcall function 00719997: __swprintf.LIBCMT ref: 00719A0C
                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 007907D6
                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0079086E
                      • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00790AAD
                      • RegCloseKey.ADVAPI32(00000000), ref: 00790ABA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                      • String ID:
                      • API String ID: 1240663315-0
                      • Opcode ID: 8a1d13b151aee4a0e60a2517e7db20ea8f9426096a060fd40238ba6d2bf4c243
                      • Instruction ID: f1ae2a977859090a263cc64f658ce6b389915cb4c7a13d2842e497412e0106cc
                      • Opcode Fuzzy Hash: 8a1d13b151aee4a0e60a2517e7db20ea8f9426096a060fd40238ba6d2bf4c243
                      • Instruction Fuzzy Hash: 9BE15D31204210EFCB14DF28D895E6ABBE9EF89714F04C56DF45ADB2A2DA34ED41CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetKeyboardState.USER32(?), ref: 00770241
                      • GetAsyncKeyState.USER32(000000A0), ref: 007702C2
                      • GetKeyState.USER32(000000A0), ref: 007702DD
                      • GetAsyncKeyState.USER32(000000A1), ref: 007702F7
                      • GetKeyState.USER32(000000A1), ref: 0077030C
                      • GetAsyncKeyState.USER32(00000011), ref: 00770324
                      • GetKeyState.USER32(00000011), ref: 00770336
                      • GetAsyncKeyState.USER32(00000012), ref: 0077034E
                      • GetKeyState.USER32(00000012), ref: 00770360
                      • GetAsyncKeyState.USER32(0000005B), ref: 00770378
                      • GetKeyState.USER32(0000005B), ref: 0077038A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: State$Async$Keyboard
                      • String ID:
                      • API String ID: 541375521-0
                      • Opcode ID: f955be161b5462aea4c9b4df3c296d3f301798043153a269896f9678d3c1e0b2
                      • Instruction ID: 92404b85d38171f1c962eb453eab16737b0d6c9ca69fcbf299849687c2df19d3
                      • Opcode Fuzzy Hash: f955be161b5462aea4c9b4df3c296d3f301798043153a269896f9678d3c1e0b2
                      • Instruction Fuzzy Hash: 084188645047C9EEFF319A6488087B5BEA07F12384F08C09ED5CE966C3EB9C59D487E2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                      • String ID:
                      • API String ID: 1737998785-0
                      • Opcode ID: ba95a52f54b24f1550fed3513d3c0494e5772344b952bf2d0d1148d24ec79773
                      • Instruction ID: 4c0cdfb1eb930f39f51388df6385fc3cbd7f3bfba6d18d0b138d707f3b9a5a49
                      • Opcode Fuzzy Hash: ba95a52f54b24f1550fed3513d3c0494e5772344b952bf2d0d1148d24ec79773
                      • Instruction Fuzzy Hash: 77216D352412119FDB10AF64EC09B6D77A8EF44721F10C02AF94ADB2A1DB78AD12CB58
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 007148AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007148A1,?,?,007137C0,?), ref: 007148CE
                        • Part of subcall function 00774CD3: GetFileAttributesW.KERNEL32(?,00773947), ref: 00774CD4
                      • FindFirstFileW.KERNEL32(?,?), ref: 00773ADF
                      • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00773B87
                      • MoveFileW.KERNEL32(?,?), ref: 00773B9A
                      • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00773BB7
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00773BD9
                      • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00773BF5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                      • String ID: \*.*
                      • API String ID: 4002782344-1173974218
                      • Opcode ID: 2efa237289d276adead2f2e8688b9f009dafd408609d80105e7e6de326fd386e
                      • Instruction ID: 3f0d3fee498e8a288e7c85ecd1b0ab94824a39b93abba9cc96edabcc71957721
                      • Opcode Fuzzy Hash: 2efa237289d276adead2f2e8688b9f009dafd408609d80105e7e6de326fd386e
                      • Instruction Fuzzy Hash: AD51913180124DDACF09EBA4CD969EDB779AF14340F6481A9E446770E1EF386F49DBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID: ERCP$Oar$VUUU$VUUU$VUUU$VUUU
                      • API String ID: 0-4160362945
                      • Opcode ID: ec978dfa590a2dd1908c5d275e2c845fcee29bf6b6f69600806a2d51abd44fc9
                      • Instruction ID: 6c2df39decd1460b5146e1c15e0fb22ed28eeda6fefdccc75f29c7af7b9c4121
                      • Opcode Fuzzy Hash: ec978dfa590a2dd1908c5d275e2c845fcee29bf6b6f69600806a2d51abd44fc9
                      • Instruction Fuzzy Hash: 7BA28F70E0422ACBDF28CF58E9807EDB7B1FB54315F1481A9D85AA7280E7789E85CF51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                      • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0077F6AB
                      • Sleep.KERNEL32(0000000A), ref: 0077F6DB
                      • _wcscmp.LIBCMT ref: 0077F6EF
                      • _wcscmp.LIBCMT ref: 0077F70A
                      • FindNextFileW.KERNEL32(?,?), ref: 0077F7A8
                      • FindClose.KERNEL32(00000000), ref: 0077F7BE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                      • String ID: *.*
                      • API String ID: 713712311-438819550
                      • Opcode ID: 475fa0b186486538b312666bad1acc75186041a05830a4453765010cad5e57d9
                      • Instruction ID: 7b4c1d3da0ae108d5dcc1e04f3e209b750f2528085aa9227cb5aed89048c6028
                      • Opcode Fuzzy Hash: 475fa0b186486538b312666bad1acc75186041a05830a4453765010cad5e57d9
                      • Instruction Fuzzy Hash: A341A27190020AEFCF15DF64CD89AEEBBB4FF05350F54856AE819A3190DB389E84CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID:
                      • API String ID: 4104443479-0
                      • Opcode ID: 2af60a76a59338dd089f8d60d97ec586be292e3110af8338bdeca21d7513df07
                      • Instruction ID: 4704ec16d10b088d434e5c05cc453bde9c75ee50f9abe06093e0d6034cd475ba
                      • Opcode Fuzzy Hash: 2af60a76a59338dd089f8d60d97ec586be292e3110af8338bdeca21d7513df07
                      • Instruction Fuzzy Hash: BB129C70A00619EFDF14DFA4D985AEEB7F5FF48300F108569E806A7291EB39AD51CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00730FF6: std::exception::exception.LIBCMT ref: 0073102C
                        • Part of subcall function 00730FF6: __CxxThrowException@8.LIBCMT ref: 00731041
                      • _memmove.LIBCMT ref: 0076062F
                      • _memmove.LIBCMT ref: 00760744
                      • _memmove.LIBCMT ref: 007607EB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memmove$Exception@8Throwstd::exception::exception
                      • String ID: yZr
                      • API String ID: 1300846289-1514024707
                      • Opcode ID: 1d749c2eec999e31240ef1945ff1f8f9ac8836f94b47adffccb0ce68b1377eb8
                      • Instruction ID: 84d3ea9b0fd4489e55d48619b946666af68d2ae79ac14fc3e19ba3fac959f03a
                      • Opcode Fuzzy Hash: 1d749c2eec999e31240ef1945ff1f8f9ac8836f94b47adffccb0ce68b1377eb8
                      • Instruction Fuzzy Hash: B90280B0A00219DFDF04DF68D995AAEBBB5FF44300F148069E806DB295EB39DE51CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00768CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00768D0D
                        • Part of subcall function 00768CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00768D3A
                        • Part of subcall function 00768CC3: GetLastError.KERNEL32 ref: 00768D47
                      • ExitWindowsEx.USER32(?,00000000), ref: 0077549B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                      • String ID: $@$SeShutdownPrivilege
                      • API String ID: 2234035333-194228
                      • Opcode ID: 7803d47a3f94def2978ac198db6741a16f1925fab4f700fb0cbd5abf925a3039
                      • Instruction ID: 732a5f391502fa2bee018c43dadbeb757d69a208c17b7cda02270de7a63ca753
                      • Opcode Fuzzy Hash: 7803d47a3f94def2978ac198db6741a16f1925fab4f700fb0cbd5abf925a3039
                      • Instruction Fuzzy Hash: 36014731A54B456AEF685378DC4ABBA7358EB003C3F248135FD0FD20C2DADC1C8081A0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __itow__swprintf
                      • String ID: Oar
                      • API String ID: 674341424-1181374745
                      • Opcode ID: 8cddb229c06063dfd5bc27a3fb9ed1ff58bda46d53bdf86352ea9e87a98b889d
                      • Instruction ID: c883394248775f2504d9730772335c2dbfdf5b08904043f34044eb11eab87034
                      • Opcode Fuzzy Hash: 8cddb229c06063dfd5bc27a3fb9ed1ff58bda46d53bdf86352ea9e87a98b889d
                      • Instruction Fuzzy Hash: F022BB71608311DFC724DF28D895BABB7E4BF84310F00491DF99A97291DB78EA49CB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 007865EF
                      • WSAGetLastError.WSOCK32(00000000), ref: 007865FE
                      • bind.WSOCK32(00000000,?,00000010), ref: 0078661A
                      • listen.WSOCK32(00000000,00000005), ref: 00786629
                      • WSAGetLastError.WSOCK32(00000000), ref: 00786643
                      • closesocket.WSOCK32(00000000,00000000), ref: 00786657
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ErrorLast$bindclosesocketlistensocket
                      • String ID:
                      • API String ID: 1279440585-0
                      • Opcode ID: c9a3a2bec9eccb51a02e2bc376655e91846e7cd396d54259dce290dae59f41b6
                      • Instruction ID: 7acfc6d008f0846953af5a70f326894441a59b7c1682affbfb7146a29b6b42ad
                      • Opcode Fuzzy Hash: c9a3a2bec9eccb51a02e2bc376655e91846e7cd396d54259dce290dae59f41b6
                      • Instruction Fuzzy Hash: DE219E30640200EFCB10AF68C849AAEB7F9EF44320F14815AE956E73D1DB78AD42CB55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00712612: GetWindowLongW.USER32(?,000000EB), ref: 00712623
                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 007119FA
                      • GetSysColor.USER32(0000000F), ref: 00711A4E
                      • SetBkColor.GDI32(?,00000000), ref: 00711A61
                        • Part of subcall function 00711290: DefDlgProcW.USER32(?,00000020,?), ref: 007112D8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ColorProc$LongWindow
                      • String ID:
                      • API String ID: 3744519093-0
                      • Opcode ID: 34ceb7edbd54329f0285ee45504062dfff232432846461e10d6376f42016f0f3
                      • Instruction ID: a1f0cb16b675fd279206dfebf2ec5ad368c2d91b554c44801e373a2c375a459a
                      • Opcode Fuzzy Hash: 34ceb7edbd54329f0285ee45504062dfff232432846461e10d6376f42016f0f3
                      • Instruction Fuzzy Hash: 73A116A1106584FADB28AB3C5C89DFF2A9DDF45341B94811AF602DE1D2CB2CDD81D2B5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 007880A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 007880CB
                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00786AB1
                      • WSAGetLastError.WSOCK32(00000000), ref: 00786ADA
                      • bind.WSOCK32(00000000,?,00000010), ref: 00786B13
                      • WSAGetLastError.WSOCK32(00000000), ref: 00786B20
                      • closesocket.WSOCK32(00000000,00000000), ref: 00786B34
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ErrorLast$bindclosesocketinet_addrsocket
                      • String ID:
                      • API String ID: 99427753-0
                      • Opcode ID: ecbaf9a5f7b3ee4b4de53ebc6f4bbdd0f5e2c7cdf1381ac17300aa3e63e6bb1c
                      • Instruction ID: 5e75a46f8ae1264688b60ae3fb59bb994f5fdd1cd3fe0808d86f7af2d7ccb8ef
                      • Opcode Fuzzy Hash: ecbaf9a5f7b3ee4b4de53ebc6f4bbdd0f5e2c7cdf1381ac17300aa3e63e6bb1c
                      • Instruction Fuzzy Hash: BA41E675740210EFEB10BF68DC9AFAE77A99F44B10F44C059FA46AB3C2CA789D418791
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                      • String ID:
                      • API String ID: 292994002-0
                      • Opcode ID: b7cdd6d2dfb0516efda3ba683bfa8f8f167524420a2d9a6e164d4ed69b531895
                      • Instruction ID: 0174184e0053202b7b6354877a683f2ef49bb6fee201d950d2ba0fa140a96d22
                      • Opcode Fuzzy Hash: b7cdd6d2dfb0516efda3ba683bfa8f8f167524420a2d9a6e164d4ed69b531895
                      • Instruction Fuzzy Hash: 0E11C831300A209FDB121F26EC58A6F7799EF44B21B858029F946D7241CB7CDD42C795
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CoInitialize.OLE32(00000000), ref: 0077C69D
                      • CoCreateInstance.OLE32(007A2D6C,00000000,00000001,007A2BDC,?), ref: 0077C6B5
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                      • CoUninitialize.OLE32 ref: 0077C922
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CreateInitializeInstanceUninitialize_memmove
                      • String ID: .lnk
                      • API String ID: 2683427295-24824748
                      • Opcode ID: 11c7268f476782d35bfd93ee65fd41dda5b1b717e7d41cf0e3225012039fd350
                      • Instruction ID: 2776ae6fe76c6f748bedb68a25d473277e56da98d3bfafa7b78c4dab60459086
                      • Opcode Fuzzy Hash: 11c7268f476782d35bfd93ee65fd41dda5b1b717e7d41cf0e3225012039fd350
                      • Instruction Fuzzy Hash: 17A12C71108205EFD704EF58C895EABB7ECEF88314F00891CF256971A2DB74EA4ACB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00751D88,?), ref: 0078C312
                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0078C324
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: GetSystemWow64DirectoryW$kernel32.dll
                      • API String ID: 2574300362-1816364905
                      • Opcode ID: 322d3479ba5667232207b7b2eebf6b5448482b19cadd6be044e2ae4af96a7bea
                      • Instruction ID: f852737bde19040e5ff760256988bd48eb5c9f9cb67b83685badc84d2a02905c
                      • Opcode Fuzzy Hash: 322d3479ba5667232207b7b2eebf6b5448482b19cadd6be044e2ae4af96a7bea
                      • Instruction Fuzzy Hash: E5E0ECB4680713CFDB215F35E804A4676D4EB09755B90C43AE896D2660E7BCD882CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32 ref: 0078F151
                      • Process32FirstW.KERNEL32(00000000,?), ref: 0078F15F
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                      • Process32NextW.KERNEL32(00000000,?), ref: 0078F21F
                      • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0078F22E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                      • String ID:
                      • API String ID: 2576544623-0
                      • Opcode ID: 9dad6ede6a061163b85842ce1b98d275ca2b12f4f2254fa7baaf07eb60fc16e8
                      • Instruction ID: 50fc99be303fbca0102474b803e1a093e34ed6e26c5c777d196254edf3869ef5
                      • Opcode Fuzzy Hash: 9dad6ede6a061163b85842ce1b98d275ca2b12f4f2254fa7baaf07eb60fc16e8
                      • Instruction Fuzzy Hash: EC517C71504300DBD314EF24DC8AEABBBE8FF94710F10492DF59597291EB78A949CB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0076EB19
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: lstrlen
                      • String ID: ($|
                      • API String ID: 1659193697-1631851259
                      • Opcode ID: 7f6638e7c1bc0fd5a74ad875fbde48c54787490b0994f4bf2091ea9426a70f6b
                      • Instruction ID: 8a49e8e713b3f3e6a54c01fd1bfa65dcc8e4af5ee0b6bccadf9b14674d36ae0f
                      • Opcode Fuzzy Hash: 7f6638e7c1bc0fd5a74ad875fbde48c54787490b0994f4bf2091ea9426a70f6b
                      • Instruction Fuzzy Hash: 96323679A00605DFDB28CF19D481A6AB7F1FF48310B15C46EE89ADB3A2E774E941CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 007826D5
                      • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 0078270C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Internet$AvailableDataFileQueryRead
                      • String ID:
                      • API String ID: 599397726-0
                      • Opcode ID: 5e3c57ae1337d2ffb0dfffbe5e9d4b078a595ea8e8fe83f35e810dd26480a0c2
                      • Instruction ID: 0874eecc903d365beef774bc1e4b8168e06614e2c955402d121377419940c99e
                      • Opcode Fuzzy Hash: 5e3c57ae1337d2ffb0dfffbe5e9d4b078a595ea8e8fe83f35e810dd26480a0c2
                      • Instruction Fuzzy Hash: 7241F771640209FFEB20FE95CC85EBBB7FCEB40726F10406EF601A6542EA799E429754
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0077B5AE
                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0077B608
                      • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0077B655
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ErrorMode$DiskFreeSpace
                      • String ID:
                      • API String ID: 1682464887-0
                      • Opcode ID: 96ccd27a98e8be18f8b3e2939eaa013f030302595645459aaf4d6195259185e0
                      • Instruction ID: a4b5e9f092c7a18a055ea47c03b0bde8809289876b67af8c022bc2db8e473ed4
                      • Opcode Fuzzy Hash: 96ccd27a98e8be18f8b3e2939eaa013f030302595645459aaf4d6195259185e0
                      • Instruction Fuzzy Hash: 35215C35A00118EFCB00EFA5D884AEDBBB8FF48310F14C0AAE945EB351DB35A956CB55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00730FF6: std::exception::exception.LIBCMT ref: 0073102C
                        • Part of subcall function 00730FF6: __CxxThrowException@8.LIBCMT ref: 00731041
                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00768D0D
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00768D3A
                      • GetLastError.KERNEL32 ref: 00768D47
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                      • String ID:
                      • API String ID: 1922334811-0
                      • Opcode ID: e832fd124512373218bc7888b90ead067831784fe05cf5875394b61d45947609
                      • Instruction ID: a85592864adaf028377ae90447406bbbcb157c2ff7ec8d517a9364f195a1cb2e
                      • Opcode Fuzzy Hash: e832fd124512373218bc7888b90ead067831784fe05cf5875394b61d45947609
                      • Instruction Fuzzy Hash: F71191B1514209AFE728EF58DC85D6BB7BCFB44710B20862EF85693241EB74AC418A64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0077404B
                      • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 00774088
                      • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00774091
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CloseControlCreateDeviceFileHandle
                      • String ID:
                      • API String ID: 33631002-0
                      • Opcode ID: 98cfe32597252b466bfd49258c851d99c9bc9bca83af253d468867bee373fdea
                      • Instruction ID: df7fbb7bbd3e760d197d2ef8858fc13660a0860e49bec32af81368bcf7e0e18b
                      • Opcode Fuzzy Hash: 98cfe32597252b466bfd49258c851d99c9bc9bca83af253d468867bee373fdea
                      • Instruction Fuzzy Hash: 561133B2904228BEE7109BE8DC44FBFBBBCEB09750F104556BA08E7191D378594587A5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00774C2C
                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00774C43
                      • FreeSid.ADVAPI32(?), ref: 00774C53
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AllocateCheckFreeInitializeMembershipToken
                      • String ID:
                      • API String ID: 3429775523-0
                      • Opcode ID: 1d7436c3e46c692fd770b938dccb85b5f74d854905cfde779fa4a5c4f856f1a4
                      • Instruction ID: c860d924f88a3abbb0fdf983d2e5f2e8a66697b2055a0b1f2786399a3b983627
                      • Opcode Fuzzy Hash: 1d7436c3e46c692fd770b938dccb85b5f74d854905cfde779fa4a5c4f856f1a4
                      • Instruction Fuzzy Hash: C1F03775A11208BBDF04DFE49C89AAEBBBCEB08201F1084A9E901E2181E7746A048B54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __time64.LIBCMT ref: 00778B25
                        • Part of subcall function 0073543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,007791F8,00000000,?,?,?,?,007793A9,00000000,?), ref: 00735443
                        • Part of subcall function 0073543A: __aulldiv.LIBCMT ref: 00735463
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Time$FileSystem__aulldiv__time64
                      • String ID: 0u}
                      • API String ID: 2893107130-2815868080
                      • Opcode ID: 5c97ce134243ae2ca1c51c206ed13989f6aa998d5e33b1204ebba75fbaca2fbf
                      • Instruction ID: 1425dc0fb0bcb91f148b461eff5d597981bfb3d7e836e4d244192673bc3ed949
                      • Opcode Fuzzy Hash: 5c97ce134243ae2ca1c51c206ed13989f6aa998d5e33b1204ebba75fbaca2fbf
                      • Instruction Fuzzy Hash: 8221E772635510CBC729CF25D441A52B3F1EBA4321B68CE6DD0F9CB2D0DA38B905CB54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 94c292ec0a8dc09104e723ff17268e4cdb6df759e9882e3cecce1fe6aaba04b1
                      • Instruction ID: 7f13dc79cd574a1a91f7e7835299e3411446cf64acd28439a8137d93be41b480
                      • Opcode Fuzzy Hash: 94c292ec0a8dc09104e723ff17268e4cdb6df759e9882e3cecce1fe6aaba04b1
                      • Instruction Fuzzy Hash: A822AB70A0021ADFDB24DF58C494AEEB7F1FF08300F148469EC56AB391E778A985CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindFirstFileW.KERNEL32(?,?), ref: 0077C966
                      • FindClose.KERNEL32(00000000), ref: 0077C996
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Find$CloseFileFirst
                      • String ID:
                      • API String ID: 2295610775-0
                      • Opcode ID: 91cda846c155639a0b7024e1bed6f21e4f0126da13a597ace90bcb7986d8bd4a
                      • Instruction ID: 9eda08315682efd9d453dba955e13cc8c9532ccb9ad826f25987f4e2cc29aa66
                      • Opcode Fuzzy Hash: 91cda846c155639a0b7024e1bed6f21e4f0126da13a597ace90bcb7986d8bd4a
                      • Instruction Fuzzy Hash: 4D11A5316006009FDB10DF29C849A6AF7E9FF84320F00C51EF9A9D7291DB38AC05CB81
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0078977D,?,0079FB84,?), ref: 0077A302
                      • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0078977D,?,0079FB84,?), ref: 0077A314
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ErrorFormatLastMessage
                      • String ID:
                      • API String ID: 3479602957-0
                      • Opcode ID: f73e6a589c3da162a6c62dd464109c140f3dbacca5a26a155c808186894f3609
                      • Instruction ID: b80a6a1a5934979419cee17edbc876e851859bd1720a886c7348caffd9b36613
                      • Opcode Fuzzy Hash: f73e6a589c3da162a6c62dd464109c140f3dbacca5a26a155c808186894f3609
                      • Instruction Fuzzy Hash: 5EF0823554422DFBEB10AFA4CC49FEE776DFF09761F008266F909D6181D6349941CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00768851), ref: 00768728
                      • CloseHandle.KERNEL32(?,?,00768851), ref: 0076873A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AdjustCloseHandlePrivilegesToken
                      • String ID:
                      • API String ID: 81990902-0
                      • Opcode ID: 647df837c63438c202040b4372da71d37ed38835d6c9bea39de0e60ea4d64966
                      • Instruction ID: 8db6a7aa0a8f1a3cadf7f09ca52a2b2e9cd108dac27fa37329f723c9c0e81d9c
                      • Opcode Fuzzy Hash: 647df837c63438c202040b4372da71d37ed38835d6c9bea39de0e60ea4d64966
                      • Instruction Fuzzy Hash: AAE0B676010610EFE7252B64ED09D777BA9EB04350B24892AF896C0471DB6AAC91DB10
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00738F97,?,?,?,00000001), ref: 0073A39A
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0073A3A3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 3fbbd1754afd74da6e100fbc9f49c93dbdeb755fd33c5d3abac6c430ad665c7a
                      • Instruction ID: 795adce89dd6bb128aeeaeeb0adb3d6bdd28038a7ce0d69299f35dd4a1afabc7
                      • Opcode Fuzzy Hash: 3fbbd1754afd74da6e100fbc9f49c93dbdeb755fd33c5d3abac6c430ad665c7a
                      • Instruction Fuzzy Hash: 14B09231054208EBCA002BA1EC09B883F68EB44BA2F408022F60DC4060CB6A54A28A99
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a9e4476be51a86eaf87b7b5a8059e92975b8f484b657f72bc6683d470ffc5a1d
                      • Instruction ID: 3a26c9f99d697b1cf4ea6ada4efb2ffb1d0ee8b3df5045f62549b6211cb8e7ac
                      • Opcode Fuzzy Hash: a9e4476be51a86eaf87b7b5a8059e92975b8f484b657f72bc6683d470ffc5a1d
                      • Instruction Fuzzy Hash: 373213A2D69F414DE7279634DC32336A248AFB73C4F15D737E81AB5AA6EB2DC4834104
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e5198f60ba8b755785337500d9203e0b57d70c231ca280eba120a8127793e0c3
                      • Instruction ID: fc148340a2210c4f7869b78332275c13f3e9a5d68736189d347a2a7f79b8449f
                      • Opcode Fuzzy Hash: e5198f60ba8b755785337500d9203e0b57d70c231ca280eba120a8127793e0c3
                      • Instruction Fuzzy Hash: A3B1FF20E2AF414DD76396398831336BA4CAFFB2D5F91D71BFC2674D22EB2585838241
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • BlockInput.USER32(00000001), ref: 00784218
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: BlockInput
                      • String ID:
                      • API String ID: 3456056419-0
                      • Opcode ID: 052a6f502e3925121b1ff9c96547c3635fd3543ff23230bd7a214e4780bcf6de
                      • Instruction ID: 3581b821ac10fc043427cf49d31afcf93051b0fe61b798b4dfaea72c20cf1d5c
                      • Opcode Fuzzy Hash: 052a6f502e3925121b1ff9c96547c3635fd3543ff23230bd7a214e4780bcf6de
                      • Instruction Fuzzy Hash: 3FE04F312842159FC710EF69D844A9AF7E8AF94760F00C026FD49D7352DAB8F841CBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00774F18
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: mouse_event
                      • String ID:
                      • API String ID: 2434400541-0
                      • Opcode ID: fa077269431e134c2ba0e361ebe401b71598018d5b0212448e52a3a619e095b2
                      • Instruction ID: a74fcb60ecd80743f6064b5eaf40b83d8d192b8a8a15a27f66f79c85bc98daf7
                      • Opcode Fuzzy Hash: fa077269431e134c2ba0e361ebe401b71598018d5b0212448e52a3a619e095b2
                      • Instruction Fuzzy Hash: 33D09EB4164609B9FC184B20AC1FF761119E3407D1FECDD89F209D54D19AED6851A035
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,007688D1), ref: 00768CB3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: LogonUser
                      • String ID:
                      • API String ID: 1244722697-0
                      • Opcode ID: e6ccb59a0cd983aedb553ae7dd548fc702da4a6a54d25246b9d0ee094b65ac94
                      • Instruction ID: f00c869a167eb82be25509cc50e998e90a54777c5b03877647e1da5710a02253
                      • Opcode Fuzzy Hash: e6ccb59a0cd983aedb553ae7dd548fc702da4a6a54d25246b9d0ee094b65ac94
                      • Instruction Fuzzy Hash: 5DD05E3226450EABEF018EA8DC01EAE3B69EB04B01F408111FE15C50A1C775D835AB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetUserNameW.ADVAPI32(?,?), ref: 00752242
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: NameUser
                      • String ID:
                      • API String ID: 2645101109-0
                      • Opcode ID: edcbf6536926e2e7b72280d60d7864fff761225a649c31962129604c4ef45435
                      • Instruction ID: 6ef49664ad9492b39c7a8642072bd898d41eeb07432ff7d004f44c55444e1ec3
                      • Opcode Fuzzy Hash: edcbf6536926e2e7b72280d60d7864fff761225a649c31962129604c4ef45435
                      • Instruction Fuzzy Hash: 9EC04CF1800109DBDB05DB90D988DFE77BCAB04305F104056E501F2100D7789B448A71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0073A36A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 18b6006f344b061f3d6100d466f9772e3027aae675ad6a265ec55fbfe3dbb355
                      • Instruction ID: 3539ce8d1c8a7523803cb021259547c7e97cb2b839c22cbab37830d458f19dde
                      • Opcode Fuzzy Hash: 18b6006f344b061f3d6100d466f9772e3027aae675ad6a265ec55fbfe3dbb355
                      • Instruction Fuzzy Hash: 5BA0123000010CE78A001B51EC044447F5CD6001907008021F40C80021873654514584
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e03e91b3e5d5f7488294f03c223eb71f8c267d3b4d05f8bf4798318b152e287d
                      • Instruction ID: 90fbeccaa60f803f6052f742d028e581f7ab1e6af706b7a342e9b4b56553ebdf
                      • Opcode Fuzzy Hash: e03e91b3e5d5f7488294f03c223eb71f8c267d3b4d05f8bf4798318b152e287d
                      • Instruction Fuzzy Hash: 47224970606626CBCF688F28E49467D77A1FB01304F2885AADC438B691DB3D9DC1DB72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                      • Instruction ID: 85a55f3b8e3034783a418b50b7ba6ff0192df5bf5e6be76136775ca04c1c73c4
                      • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                      • Instruction Fuzzy Hash: A2C1913220619309EF2D8639943403EBBE15EA27B1B5A0B5DE4F3CB5D7EF28D525D620
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                      • Instruction ID: f88982edb06aa4ac99cda376dc1df7dc428304d6b07417fbd34b1c0c0995d49e
                      • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                      • Instruction Fuzzy Hash: 97C1C6322061930AEF2D463A843413EFBE15BA27B175A0B5DE4F2DB4C7EF28D525D620
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1677391334.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9f0000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                      • Instruction ID: a075cfe306c9c58a61f760774a1f32d6664e7d3b3fdb2ff938778315abdb5cbc
                      • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                      • Instruction Fuzzy Hash: D041D3B1D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D734AB41DB40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1677391334.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9f0000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                      • Instruction ID: 9031444b1c1eb02cca8802cfdc7675a7067cc9d1a9129b8b366824a29bf1075d
                      • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                      • Instruction Fuzzy Hash: 93019D78A04209EFCB48DF98C5909AEF7B5FB88310F608599E919A7701E734EE41DB80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1677391334.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9f0000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                      • Instruction ID: 8a3934c9df97f7c44c966b5588724f510ee9e9d53d27aa66f2152afcc7a05555
                      • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                      • Instruction Fuzzy Hash: E9019278A11109EFCB44DF98C5909AEF7B5FB88310F608699E909A7701D734AE51DB80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1677391334.00000000009F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9f0000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                      • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                      • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                      • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CharUpperBuffW.USER32(?,?,0079F910), ref: 007938AF
                      • IsWindowVisible.USER32(?), ref: 007938D3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: BuffCharUpperVisibleWindow
                      • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                      • API String ID: 4105515805-45149045
                      • Opcode ID: 90bc12ba0674461a423ad2a3d95e218cca98ffe37b34bff602ba4abe6b4c3249
                      • Instruction ID: ed58d160bf4dfc52865885fa56ac07a83c320fa56ce9808ce396e70649e46d4e
                      • Opcode Fuzzy Hash: 90bc12ba0674461a423ad2a3d95e218cca98ffe37b34bff602ba4abe6b4c3249
                      • Instruction Fuzzy Hash: 0ED17130204605DBCF14EF24D469AAA77A9AF55354F10846CF8865B2E3CB3DEE4ACB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetTextColor.GDI32(?,00000000), ref: 0079A89F
                      • GetSysColorBrush.USER32(0000000F), ref: 0079A8D0
                      • GetSysColor.USER32(0000000F), ref: 0079A8DC
                      • SetBkColor.GDI32(?,000000FF), ref: 0079A8F6
                      • SelectObject.GDI32(?,?), ref: 0079A905
                      • InflateRect.USER32(?,000000FF,000000FF), ref: 0079A930
                      • GetSysColor.USER32(00000010), ref: 0079A938
                      • CreateSolidBrush.GDI32(00000000), ref: 0079A93F
                      • FrameRect.USER32(?,?,00000000), ref: 0079A94E
                      • DeleteObject.GDI32(00000000), ref: 0079A955
                      • InflateRect.USER32(?,000000FE,000000FE), ref: 0079A9A0
                      • FillRect.USER32(?,?,?), ref: 0079A9D2
                      • GetWindowLongW.USER32(?,000000F0), ref: 0079A9FD
                        • Part of subcall function 0079AB60: GetSysColor.USER32(00000012), ref: 0079AB99
                        • Part of subcall function 0079AB60: SetTextColor.GDI32(?,?), ref: 0079AB9D
                        • Part of subcall function 0079AB60: GetSysColorBrush.USER32(0000000F), ref: 0079ABB3
                        • Part of subcall function 0079AB60: GetSysColor.USER32(0000000F), ref: 0079ABBE
                        • Part of subcall function 0079AB60: GetSysColor.USER32(00000011), ref: 0079ABDB
                        • Part of subcall function 0079AB60: CreatePen.GDI32(00000000,00000001,@b}), ref: 0079ABE9
                        • Part of subcall function 0079AB60: SelectObject.GDI32(?,00000000), ref: 0079ABFA
                        • Part of subcall function 0079AB60: SetBkColor.GDI32(?,00000000), ref: 0079AC03
                        • Part of subcall function 0079AB60: SelectObject.GDI32(?,?), ref: 0079AC10
                        • Part of subcall function 0079AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 0079AC2F
                        • Part of subcall function 0079AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0079AC46
                        • Part of subcall function 0079AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 0079AC5B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                      • String ID:
                      • API String ID: 4124339563-0
                      • Opcode ID: e3ddc96b114b864016e7f3ed371895d4ff84036b6e1b475a37cd4c4e0600f801
                      • Instruction ID: f8f04e02794a588e9d2e09a5c8712ace3a2cc662edf79d6767b44fbb2d920698
                      • Opcode Fuzzy Hash: e3ddc96b114b864016e7f3ed371895d4ff84036b6e1b475a37cd4c4e0600f801
                      • Instruction Fuzzy Hash: BFA19271009305FFDB119F64DC08E6B7BA9FF88321F108A2AF962D61A0D778D845CB96
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DestroyWindow.USER32(?,?,?), ref: 00712CA2
                      • DeleteObject.GDI32(00000000), ref: 00712CE8
                      • DeleteObject.GDI32(00000000), ref: 00712CF3
                      • DestroyIcon.USER32(00000000,?,?,?), ref: 00712CFE
                      • DestroyWindow.USER32(00000000,?,?,?), ref: 00712D09
                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 0074C68B
                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0074C6C4
                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0074CAED
                        • Part of subcall function 00711B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00712036,?,00000000,?,?,?,?,007116CB,00000000,?), ref: 00711B9A
                      • SendMessageW.USER32(?,00001053), ref: 0074CB2A
                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0074CB41
                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0074CB57
                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0074CB62
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                      • String ID: 0
                      • API String ID: 464785882-4108050209
                      • Opcode ID: dfa5a03f52e3d3388ba33ba0c8f4c8101b9308f2945440ecddd8ea522845b9b8
                      • Instruction ID: 0bfbaf669d5c8b2d51f79b5f8cb8963aeaae1adc40aeed7cdde8d7432276cbb2
                      • Opcode Fuzzy Hash: dfa5a03f52e3d3388ba33ba0c8f4c8101b9308f2945440ecddd8ea522845b9b8
                      • Instruction Fuzzy Hash: 3D129230605201EFDB52CF28C888BA9B7E5FF45310F548569F595DB2A2C739EC92CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetSysColor.USER32(00000012), ref: 0079AB99
                      • SetTextColor.GDI32(?,?), ref: 0079AB9D
                      • GetSysColorBrush.USER32(0000000F), ref: 0079ABB3
                      • GetSysColor.USER32(0000000F), ref: 0079ABBE
                      • CreateSolidBrush.GDI32(?), ref: 0079ABC3
                      • GetSysColor.USER32(00000011), ref: 0079ABDB
                      • CreatePen.GDI32(00000000,00000001,@b}), ref: 0079ABE9
                      • SelectObject.GDI32(?,00000000), ref: 0079ABFA
                      • SetBkColor.GDI32(?,00000000), ref: 0079AC03
                      • SelectObject.GDI32(?,?), ref: 0079AC10
                      • InflateRect.USER32(?,000000FF,000000FF), ref: 0079AC2F
                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0079AC46
                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0079AC5B
                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0079ACA7
                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0079ACCE
                      • InflateRect.USER32(?,000000FD,000000FD), ref: 0079ACEC
                      • DrawFocusRect.USER32(?,?), ref: 0079ACF7
                      • GetSysColor.USER32(00000011), ref: 0079AD05
                      • SetTextColor.GDI32(?,00000000), ref: 0079AD0D
                      • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0079AD21
                      • SelectObject.GDI32(?,0079A869), ref: 0079AD38
                      • DeleteObject.GDI32(?), ref: 0079AD43
                      • SelectObject.GDI32(?,?), ref: 0079AD49
                      • DeleteObject.GDI32(?), ref: 0079AD4E
                      • SetTextColor.GDI32(?,?), ref: 0079AD54
                      • SetBkColor.GDI32(?,?), ref: 0079AD5E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                      • String ID: @b}
                      • API String ID: 1996641542-4137963638
                      • Opcode ID: 28fcdecbf76e2d9ff61b7692a17dacd26d66a68a3b9ae4ddb7b2b01a5bb3aa95
                      • Instruction ID: 0ce02923b83f7fad647612fc268d64d3f3ae38cfec12a688e94b5e19d2189083
                      • Opcode Fuzzy Hash: 28fcdecbf76e2d9ff61b7692a17dacd26d66a68a3b9ae4ddb7b2b01a5bb3aa95
                      • Instruction Fuzzy Hash: F4615E71901218FFDF119FA8DC48EAE7B79EB08320F118126F915EB2A1D6799D41DB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DestroyWindow.USER32(00000000), ref: 007877F1
                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 007878B0
                      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 007878EE
                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00787900
                      • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00787946
                      • GetClientRect.USER32(00000000,?), ref: 00787952
                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00787996
                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 007879A5
                      • GetStockObject.GDI32(00000011), ref: 007879B5
                      • SelectObject.GDI32(00000000,00000000), ref: 007879B9
                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 007879C9
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007879D2
                      • DeleteDC.GDI32(00000000), ref: 007879DB
                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00787A07
                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 00787A1E
                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00787A59
                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00787A6D
                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 00787A7E
                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00787AAE
                      • GetStockObject.GDI32(00000011), ref: 00787AB9
                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00787AC4
                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00787ACE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                      • API String ID: 2910397461-517079104
                      • Opcode ID: 9173698b21c2b67aaab6192e508e8eef0b855714298cca855fe7063c3b0f694f
                      • Instruction ID: 568eb76e3a85f6d7652607bd6a9389f3352e6fb677ba7acb83952e50309507dd
                      • Opcode Fuzzy Hash: 9173698b21c2b67aaab6192e508e8eef0b855714298cca855fe7063c3b0f694f
                      • Instruction Fuzzy Hash: 92A16071A40209BFEB14DBA8DC4AFAE7BB9EB44710F108115FA15E72E0D778AD01CB64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0077AF89
                      • GetDriveTypeW.KERNEL32(?,0079FAC0,?,\\.\,0079F910), ref: 0077B066
                      • SetErrorMode.KERNEL32(00000000,0079FAC0,?,\\.\,0079F910), ref: 0077B1C4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ErrorMode$DriveType
                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                      • API String ID: 2907320926-4222207086
                      • Opcode ID: 7450e77e4e679ea82047cde894643fb996472196033fc7b3ff36d35696bcefe3
                      • Instruction ID: adad1983ae9ed56a04d80e39d2a205572dc644eadf2eb2cb6deedf5b6b3d202f
                      • Opcode Fuzzy Hash: 7450e77e4e679ea82047cde894643fb996472196033fc7b3ff36d35696bcefe3
                      • Instruction Fuzzy Hash: 15517DB068434DEA8F04DB24C9AAFBD73B2BB543C6760C01DE40EA7690D72D9D42DB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __wcsnicmp
                      • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                      • API String ID: 1038674560-86951937
                      • Opcode ID: ccb53973b58e7add467ec90db16133b9590a3a34a08c9f6e73c1eea6cbdf4a71
                      • Instruction ID: 59542865a0b50d20f7a99019355fc77ddeded2eda70d96c046cafa7dfe162602
                      • Opcode Fuzzy Hash: ccb53973b58e7add467ec90db16133b9590a3a34a08c9f6e73c1eea6cbdf4a71
                      • Instruction Fuzzy Hash: AC8108B0644205FBDB35AF38CC86FEA77A8BF15714F148025F945AA1C2EB6CDA81C291
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00798D34
                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00798D45
                      • CharNextW.USER32(0000014E), ref: 00798D74
                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00798DB5
                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00798DCB
                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00798DDC
                      • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00798DF9
                      • SetWindowTextW.USER32(?,0000014E), ref: 00798E45
                      • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00798E5B
                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00798E8C
                      • _memset.LIBCMT ref: 00798EB1
                      • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00798EFA
                      • _memset.LIBCMT ref: 00798F59
                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00798F83
                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 00798FDB
                      • SendMessageW.USER32(?,0000133D,?,?), ref: 00799088
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 007990AA
                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007990F4
                      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00799121
                      • DrawMenuBar.USER32(?), ref: 00799130
                      • SetWindowTextW.USER32(?,0000014E), ref: 00799158
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                      • String ID: 0
                      • API String ID: 1073566785-4108050209
                      • Opcode ID: ff59508a9648b9a3409fcfe962d70cecb67155fc2c027b48d7d7c5a33d541172
                      • Instruction ID: bab70a59a34aef08eb31134c2a89ba090fe12dd4e22a1a7fb2df38e5cb2c216b
                      • Opcode Fuzzy Hash: ff59508a9648b9a3409fcfe962d70cecb67155fc2c027b48d7d7c5a33d541172
                      • Instruction Fuzzy Hash: FBE1A570901219EBDF20DF64DC88EEE7B79FF0A710F10815AF9159A291DB788A81DF61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetCursorPos.USER32(?), ref: 00794C51
                      • GetDesktopWindow.USER32 ref: 00794C66
                      • GetWindowRect.USER32(00000000), ref: 00794C6D
                      • GetWindowLongW.USER32(?,000000F0), ref: 00794CCF
                      • DestroyWindow.USER32(?), ref: 00794CFB
                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00794D24
                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00794D42
                      • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00794D68
                      • SendMessageW.USER32(?,00000421,?,?), ref: 00794D7D
                      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00794D90
                      • IsWindowVisible.USER32(?), ref: 00794DB0
                      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00794DCB
                      • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00794DDF
                      • GetWindowRect.USER32(?,?), ref: 00794DF7
                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00794E1D
                      • GetMonitorInfoW.USER32(00000000,?), ref: 00794E37
                      • CopyRect.USER32(?,?), ref: 00794E4E
                      • SendMessageW.USER32(?,00000412,00000000), ref: 00794EB9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                      • String ID: ($0$tooltips_class32
                      • API String ID: 698492251-4156429822
                      • Opcode ID: 22dde8167edf14eca199e89ff310ab09dd2e78d2cbb2ee30db3e5dc2fadb68e8
                      • Instruction ID: 87dfbb47244fcd130b8090ec1f72656660393a7df95d99ff1e9b3a6d48d66035
                      • Opcode Fuzzy Hash: 22dde8167edf14eca199e89ff310ab09dd2e78d2cbb2ee30db3e5dc2fadb68e8
                      • Instruction Fuzzy Hash: E1B18A71604340AFDB04DF28D849F6ABBE4BF88714F00891DF5999B2A1D778EC46CBA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007128BC
                      • GetSystemMetrics.USER32(00000007), ref: 007128C4
                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007128EF
                      • GetSystemMetrics.USER32(00000008), ref: 007128F7
                      • GetSystemMetrics.USER32(00000004), ref: 0071291C
                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00712939
                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00712949
                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0071297C
                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00712990
                      • GetClientRect.USER32(00000000,000000FF), ref: 007129AE
                      • GetStockObject.GDI32(00000011), ref: 007129CA
                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 007129D5
                        • Part of subcall function 00712344: GetCursorPos.USER32(?), ref: 00712357
                        • Part of subcall function 00712344: ScreenToClient.USER32(007D67B0,?), ref: 00712374
                        • Part of subcall function 00712344: GetAsyncKeyState.USER32(00000001), ref: 00712399
                        • Part of subcall function 00712344: GetAsyncKeyState.USER32(00000002), ref: 007123A7
                      • SetTimer.USER32(00000000,00000000,00000028,00711256), ref: 007129FC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                      • String ID: AutoIt v3 GUI
                      • API String ID: 1458621304-248962490
                      • Opcode ID: fedff877092ef4824185bce0a8c600b2bec01f0fdaf345c779ea3b44f87f885d
                      • Instruction ID: 73e697fb376ae2871edad1cf4ed1e4b77685e91eb764a9aa392fe30ca8850d63
                      • Opcode Fuzzy Hash: fedff877092ef4824185bce0a8c600b2bec01f0fdaf345c779ea3b44f87f885d
                      • Instruction Fuzzy Hash: 7BB15C7160120AEFDB14DFA8DC45BEE7BB4FB08314F10812AFA15E62D0DB789852CB54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CharUpperBuffW.USER32(?,?), ref: 007940F6
                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 007941B6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: BuffCharMessageSendUpper
                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                      • API String ID: 3974292440-719923060
                      • Opcode ID: ca3dcf8cb63d81a420ada33e0b90bee53dcb4efbf9aaa2f73ca6ce093eda384f
                      • Instruction ID: a23bbc88bb7a229fad72533e4b2f0a5532226a3dd8d241963740f8b3fc8452f3
                      • Opcode Fuzzy Hash: ca3dcf8cb63d81a420ada33e0b90bee53dcb4efbf9aaa2f73ca6ce093eda384f
                      • Instruction Fuzzy Hash: 88A18F30214305DBCF14EF24D855E6AB3E9BF84314F10896CB896AB6D2DB38EC46CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadCursorW.USER32(00000000,00007F89), ref: 00785309
                      • LoadCursorW.USER32(00000000,00007F8A), ref: 00785314
                      • LoadCursorW.USER32(00000000,00007F00), ref: 0078531F
                      • LoadCursorW.USER32(00000000,00007F03), ref: 0078532A
                      • LoadCursorW.USER32(00000000,00007F8B), ref: 00785335
                      • LoadCursorW.USER32(00000000,00007F01), ref: 00785340
                      • LoadCursorW.USER32(00000000,00007F81), ref: 0078534B
                      • LoadCursorW.USER32(00000000,00007F88), ref: 00785356
                      • LoadCursorW.USER32(00000000,00007F80), ref: 00785361
                      • LoadCursorW.USER32(00000000,00007F86), ref: 0078536C
                      • LoadCursorW.USER32(00000000,00007F83), ref: 00785377
                      • LoadCursorW.USER32(00000000,00007F85), ref: 00785382
                      • LoadCursorW.USER32(00000000,00007F82), ref: 0078538D
                      • LoadCursorW.USER32(00000000,00007F84), ref: 00785398
                      • LoadCursorW.USER32(00000000,00007F04), ref: 007853A3
                      • LoadCursorW.USER32(00000000,00007F02), ref: 007853AE
                      • GetCursorInfo.USER32(?), ref: 007853BE
                      • GetLastError.KERNEL32(00000001,00000000), ref: 007853E9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Cursor$Load$ErrorInfoLast
                      • String ID:
                      • API String ID: 3215588206-0
                      • Opcode ID: 368878f896413c21810b9095768388df61861849d4a7956f0b95b6f938afc5f0
                      • Instruction ID: 900dea564c3e439309788c89a506045ab9e8b5ca82c6e0b2dc17c98ce8e8c42f
                      • Opcode Fuzzy Hash: 368878f896413c21810b9095768388df61861849d4a7956f0b95b6f938afc5f0
                      • Instruction Fuzzy Hash: B0416470E44319AADB10AFBA8C4996FFFF8EF51B50B10452FE509E7290DAB8A401CF51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetClassNameW.USER32(?,?,00000100), ref: 0076AAA5
                      • __swprintf.LIBCMT ref: 0076AB46
                      • _wcscmp.LIBCMT ref: 0076AB59
                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0076ABAE
                      • _wcscmp.LIBCMT ref: 0076ABEA
                      • GetClassNameW.USER32(?,?,00000400), ref: 0076AC21
                      • GetDlgCtrlID.USER32(?), ref: 0076AC73
                      • GetWindowRect.USER32(?,?), ref: 0076ACA9
                      • GetParent.USER32(?), ref: 0076ACC7
                      • ScreenToClient.USER32(00000000), ref: 0076ACCE
                      • GetClassNameW.USER32(?,?,00000100), ref: 0076AD48
                      • _wcscmp.LIBCMT ref: 0076AD5C
                      • GetWindowTextW.USER32(?,?,00000400), ref: 0076AD82
                      • _wcscmp.LIBCMT ref: 0076AD96
                        • Part of subcall function 0073386C: _iswctype.LIBCMT ref: 00733874
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                      • String ID: %s%u
                      • API String ID: 3744389584-679674701
                      • Opcode ID: cbc1673d6379440325ba7114e189237af397477aa5885b022b6cfb18da957b33
                      • Instruction ID: 6c7ac990fc68299f3009102e3e4b1a93e7debb3c77a4896e0c0d662e43b80212
                      • Opcode Fuzzy Hash: cbc1673d6379440325ba7114e189237af397477aa5885b022b6cfb18da957b33
                      • Instruction Fuzzy Hash: 96A1BC71204306BBD714DF64C884BAAB7E8FF04355F10862AFD9AE2191D738E955CFA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetClassNameW.USER32(00000008,?,00000400), ref: 0076B3DB
                      • _wcscmp.LIBCMT ref: 0076B3EC
                      • GetWindowTextW.USER32(00000001,?,00000400), ref: 0076B414
                      • CharUpperBuffW.USER32(?,00000000), ref: 0076B431
                      • _wcscmp.LIBCMT ref: 0076B44F
                      • _wcsstr.LIBCMT ref: 0076B460
                      • GetClassNameW.USER32(00000018,?,00000400), ref: 0076B498
                      • _wcscmp.LIBCMT ref: 0076B4A8
                      • GetWindowTextW.USER32(00000002,?,00000400), ref: 0076B4CF
                      • GetClassNameW.USER32(00000018,?,00000400), ref: 0076B518
                      • _wcscmp.LIBCMT ref: 0076B528
                      • GetClassNameW.USER32(00000010,?,00000400), ref: 0076B550
                      • GetWindowRect.USER32(00000004,?), ref: 0076B5B9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                      • String ID: @$ThumbnailClass
                      • API String ID: 1788623398-1539354611
                      • Opcode ID: 00dffecdd4335115c3f01bef61b83671984b568704b09cc72c6c4128cb6429b8
                      • Instruction ID: de7b24700d6d82c9cc2cf41ee159311d6b710939803102d899b4cfd49a4775cb
                      • Opcode Fuzzy Hash: 00dffecdd4335115c3f01bef61b83671984b568704b09cc72c6c4128cb6429b8
                      • Instruction Fuzzy Hash: 2481C0710083459BDB14DF14C885FAA7BE8EF45314F04856AFD87DA092DB38DD8ACB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00712612: GetWindowLongW.USER32(?,000000EB), ref: 00712623
                      • DragQueryPoint.SHELL32(?,?), ref: 0079C917
                        • Part of subcall function 0079ADF1: ClientToScreen.USER32(?,?), ref: 0079AE1A
                        • Part of subcall function 0079ADF1: GetWindowRect.USER32(?,?), ref: 0079AE90
                        • Part of subcall function 0079ADF1: PtInRect.USER32(?,?,0079C304), ref: 0079AEA0
                      • SendMessageW.USER32(?,000000B0,?,?), ref: 0079C980
                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0079C98B
                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0079C9AE
                      • _wcscat.LIBCMT ref: 0079C9DE
                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0079C9F5
                      • SendMessageW.USER32(?,000000B0,?,?), ref: 0079CA0E
                      • SendMessageW.USER32(?,000000B1,?,?), ref: 0079CA25
                      • SendMessageW.USER32(?,000000B1,?,?), ref: 0079CA47
                      • DragFinish.SHELL32(?), ref: 0079CA4E
                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0079CB41
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pr}
                      • API String ID: 169749273-4250750409
                      • Opcode ID: bdfae873b4096fd5a46abb2d33ae66dd7c4a53c3743ab8eb2c90e902aeb339e7
                      • Instruction ID: 72470a809ac9dcca1a15d110b4390ab772f3badd514dbe9c132a7399c0b291b8
                      • Opcode Fuzzy Hash: bdfae873b4096fd5a46abb2d33ae66dd7c4a53c3743ab8eb2c90e902aeb339e7
                      • Instruction Fuzzy Hash: 94617C71108300EFCB01DF64DC89D9BBBF9EF88710F004A2EF591961A1DB389A4ACB56
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __wcsnicmp
                      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                      • API String ID: 1038674560-1810252412
                      • Opcode ID: 52802a644e9d722b7415df580fbbceecf4d280ae4809c16f363dbb7def3039ae
                      • Instruction ID: 56348960d12f6e7b1722362d742fb449f622dd5a3c6c59336f0bbf043f4fd6c5
                      • Opcode Fuzzy Hash: 52802a644e9d722b7415df580fbbceecf4d280ae4809c16f363dbb7def3039ae
                      • Instruction Fuzzy Hash: 9C31D271A44209EADB14FA64CD5BFEE77B8AF21750F60002DF942B10D2EF6D6E84C551
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadIconW.USER32(00000063), ref: 0076C4D4
                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0076C4E6
                      • SetWindowTextW.USER32(?,?), ref: 0076C4FD
                      • GetDlgItem.USER32(?,000003EA), ref: 0076C512
                      • SetWindowTextW.USER32(00000000,?), ref: 0076C518
                      • GetDlgItem.USER32(?,000003E9), ref: 0076C528
                      • SetWindowTextW.USER32(00000000,?), ref: 0076C52E
                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0076C54F
                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0076C569
                      • GetWindowRect.USER32(?,?), ref: 0076C572
                      • SetWindowTextW.USER32(?,?), ref: 0076C5DD
                      • GetDesktopWindow.USER32 ref: 0076C5E3
                      • GetWindowRect.USER32(00000000), ref: 0076C5EA
                      • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0076C636
                      • GetClientRect.USER32(?,?), ref: 0076C643
                      • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0076C668
                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0076C693
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                      • String ID:
                      • API String ID: 3869813825-0
                      • Opcode ID: 53f401da98d25ab2556070639439f9a79500ab312e116e9fd857a923df6ae88b
                      • Instruction ID: 4c5e63c9653da2669a94d66d580b6b1b06df24af08c05ec0604f9f64c8eba8a5
                      • Opcode Fuzzy Hash: 53f401da98d25ab2556070639439f9a79500ab312e116e9fd857a923df6ae88b
                      • Instruction Fuzzy Hash: C4519D31900709EFDB21DFA8CD89B6EBBF5FF04704F104929EA83A25A0C778A915CB54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 0079A4C8
                      • DestroyWindow.USER32(?,?), ref: 0079A542
                        • Part of subcall function 00717D2C: _memmove.LIBCMT ref: 00717D66
                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0079A5BC
                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0079A5DE
                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0079A5F1
                      • DestroyWindow.USER32(00000000), ref: 0079A613
                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00710000,00000000), ref: 0079A64A
                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0079A663
                      • GetDesktopWindow.USER32 ref: 0079A67C
                      • GetWindowRect.USER32(00000000), ref: 0079A683
                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0079A69B
                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0079A6B3
                        • Part of subcall function 007125DB: GetWindowLongW.USER32(?,000000EB), ref: 007125EC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                      • String ID: 0$tooltips_class32
                      • API String ID: 1297703922-3619404913
                      • Opcode ID: 9aab4f5cf268b0f2c5e6268378db471d820adfceb1541be996cd6681c25a2020
                      • Instruction ID: de95e79bcaa8b61504b7cb38c8ac2a36215b408d3eb76afcbdf45213bc407f44
                      • Opcode Fuzzy Hash: 9aab4f5cf268b0f2c5e6268378db471d820adfceb1541be996cd6681c25a2020
                      • Instruction Fuzzy Hash: 58719971145305AFDB20CF28DC49FAA7BF6EB88304F08452EF985872A0D778E942DB56
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CharUpperBuffW.USER32(?,?), ref: 007946AB
                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007946F6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: BuffCharMessageSendUpper
                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                      • API String ID: 3974292440-4258414348
                      • Opcode ID: 9633f9abcb739d3d535c934ffd91b2c4f31ce5cdbb5643e85879fc4fd776398f
                      • Instruction ID: c98c320491f7bf23eedab871327f2d5c7f1f566d7202d3d60460dd69e458feb8
                      • Opcode Fuzzy Hash: 9633f9abcb739d3d535c934ffd91b2c4f31ce5cdbb5643e85879fc4fd776398f
                      • Instruction Fuzzy Hash: B1915C74204305DBCB14EF24D465EAAB7E5AF84314F04886CF8965B3A2DB39ED4ACB81
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadStringW.USER32(00000066,?,00000FFF,0079FB78), ref: 0077A0FC
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                      • LoadStringW.USER32(?,?,00000FFF,?), ref: 0077A11E
                      • __swprintf.LIBCMT ref: 0077A177
                      • __swprintf.LIBCMT ref: 0077A190
                      • _wprintf.LIBCMT ref: 0077A246
                      • _wprintf.LIBCMT ref: 0077A264
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: LoadString__swprintf_wprintf$_memmove
                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR$%z
                      • API String ID: 311963372-3574818463
                      • Opcode ID: e0eb28898e579afb6a76f7e456debe3c5b98c132243dd852a1004c18063c2462
                      • Instruction ID: 63786ac52e6c998fad964abac6272c469026ca41aa7bb5726853e43f88a65d82
                      • Opcode Fuzzy Hash: e0eb28898e579afb6a76f7e456debe3c5b98c132243dd852a1004c18063c2462
                      • Instruction Fuzzy Hash: 1E516072900209FADF19EBE4CD4AEEEB779AF44300F104165F505720A2EB396F99DB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00719997: __itow.LIBCMT ref: 007199C2
                        • Part of subcall function 00719997: __swprintf.LIBCMT ref: 00719A0C
                      • CharLowerBuffW.USER32(?,?), ref: 0077A636
                      • GetDriveTypeW.KERNEL32 ref: 0077A683
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0077A6CB
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0077A702
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0077A730
                        • Part of subcall function 00717D2C: _memmove.LIBCMT ref: 00717D66
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                      • API String ID: 2698844021-4113822522
                      • Opcode ID: 06d9539cce533411313b7dfe1687eb36df4f9fe43084e6fa45a20e8d00603ca5
                      • Instruction ID: 7c78d3e9da8c8c3d54d3d5eda29dcd8a9962b59296daec5a38d48781ebcf98a2
                      • Opcode Fuzzy Hash: 06d9539cce533411313b7dfe1687eb36df4f9fe43084e6fa45a20e8d00603ca5
                      • Instruction Fuzzy Hash: C7517F71104304EFC704EF24C8959AAB7F8FF84758F04896CF88597291DB39AD4ACB82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0077A47A
                      • __swprintf.LIBCMT ref: 0077A49C
                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0077A4D9
                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0077A4FE
                      • _memset.LIBCMT ref: 0077A51D
                      • _wcsncpy.LIBCMT ref: 0077A559
                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0077A58E
                      • CloseHandle.KERNEL32(00000000), ref: 0077A599
                      • RemoveDirectoryW.KERNEL32(?), ref: 0077A5A2
                      • CloseHandle.KERNEL32(00000000), ref: 0077A5AC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                      • String ID: :$\$\??\%s
                      • API String ID: 2733774712-3457252023
                      • Opcode ID: 3b4b42a120f017f56b2f6704c72d99fb216dd5acf491f59023e529fb9be9e1ce
                      • Instruction ID: df67a0f7e42d6caa98d886624bb5344ce976a5616dd7a9347715db2bfc8c4b7e
                      • Opcode Fuzzy Hash: 3b4b42a120f017f56b2f6704c72d99fb216dd5acf491f59023e529fb9be9e1ce
                      • Instruction Fuzzy Hash: C831B3B1500109BBEB219FA0DC49FEF37BCEF88741F1080B6F508D2150E77896558B25
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                      • String ID:
                      • API String ID: 884005220-0
                      • Opcode ID: 7d67faa81b4c7e8f99356f92a1025168dbe12aa0bf149f0fca92fba5b3d83b99
                      • Instruction ID: 2af52d84a43e04e11227c5649697307f977a1d31bb161c4d2c0def33e5d49206
                      • Opcode Fuzzy Hash: 7d67faa81b4c7e8f99356f92a1025168dbe12aa0bf149f0fca92fba5b3d83b99
                      • Instruction Fuzzy Hash: 5461F7B2981306FFEB205F24DC45B797BA5EF11321F248116F8019B292DB3DD941CBA6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00712612: GetWindowLongW.USER32(?,000000EB), ref: 00712623
                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0079C4EC
                      • GetFocus.USER32 ref: 0079C4FC
                      • GetDlgCtrlID.USER32(00000000), ref: 0079C507
                      • _memset.LIBCMT ref: 0079C632
                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0079C65D
                      • GetMenuItemCount.USER32(?), ref: 0079C67D
                      • GetMenuItemID.USER32(?,00000000), ref: 0079C690
                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0079C6C4
                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0079C70C
                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0079C744
                      • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0079C779
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                      • String ID: 0
                      • API String ID: 1296962147-4108050209
                      • Opcode ID: a1d0ebe42fbc70be5abf2f00d2827f7555409f6f872a167f0807ca9b34d4c772
                      • Instruction ID: 568b207fd0e8adf1d9dc02b20583d68c421bbf437c737991948162bdfcdc9e3b
                      • Opcode Fuzzy Hash: a1d0ebe42fbc70be5abf2f00d2827f7555409f6f872a167f0807ca9b34d4c772
                      • Instruction Fuzzy Hash: F7818E70208341AFDF11CF14E985A6BBBE9FB88314F10492EF99597291D738E915CFA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 0076874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00768766
                        • Part of subcall function 0076874A: GetLastError.KERNEL32(?,0076822A,?,?,?), ref: 00768770
                        • Part of subcall function 0076874A: GetProcessHeap.KERNEL32(00000008,?,?,0076822A,?,?,?), ref: 0076877F
                        • Part of subcall function 0076874A: HeapAlloc.KERNEL32(00000000,?,0076822A,?,?,?), ref: 00768786
                        • Part of subcall function 0076874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0076879D
                        • Part of subcall function 007687E7: GetProcessHeap.KERNEL32(00000008,00768240,00000000,00000000,?,00768240,?), ref: 007687F3
                        • Part of subcall function 007687E7: HeapAlloc.KERNEL32(00000000,?,00768240,?), ref: 007687FA
                        • Part of subcall function 007687E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00768240,?), ref: 0076880B
                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00768458
                      • _memset.LIBCMT ref: 0076846D
                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0076848C
                      • GetLengthSid.ADVAPI32(?), ref: 0076849D
                      • GetAce.ADVAPI32(?,00000000,?), ref: 007684DA
                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007684F6
                      • GetLengthSid.ADVAPI32(?), ref: 00768513
                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00768522
                      • HeapAlloc.KERNEL32(00000000), ref: 00768529
                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0076854A
                      • CopySid.ADVAPI32(00000000), ref: 00768551
                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00768582
                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007685A8
                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007685BC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                      • String ID:
                      • API String ID: 3996160137-0
                      • Opcode ID: e49989aeea35376143db65245521cf6152f4bfd58c33c34f62f044bc739083f7
                      • Instruction ID: 173affbdb6acd1e7830baa3469e03ad567268fb077b70a77e5f00f50a695ade8
                      • Opcode Fuzzy Hash: e49989aeea35376143db65245521cf6152f4bfd58c33c34f62f044bc739083f7
                      • Instruction Fuzzy Hash: 92611C71900209EBDF50DF94DC45AAEBBB9FF04300F14826AE916E6292DB399A15CF61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetDC.USER32(00000000), ref: 007876A2
                      • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 007876AE
                      • CreateCompatibleDC.GDI32(?), ref: 007876BA
                      • SelectObject.GDI32(00000000,?), ref: 007876C7
                      • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 0078771B
                      • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00787757
                      • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 0078777B
                      • SelectObject.GDI32(00000006,?), ref: 00787783
                      • DeleteObject.GDI32(?), ref: 0078778C
                      • DeleteDC.GDI32(00000006), ref: 00787793
                      • ReleaseDC.USER32(00000000,?), ref: 0078779E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                      • String ID: (
                      • API String ID: 2598888154-3887548279
                      • Opcode ID: ec0001cf9fca862a4d7756e8d9657ac228d1d8ce30395b35015b10cb29385cf9
                      • Instruction ID: e5efac002b1dbda589af623d031450d14b2b4888848d0e66fb527e39e9ccc158
                      • Opcode Fuzzy Hash: ec0001cf9fca862a4d7756e8d9657ac228d1d8ce30395b35015b10cb29385cf9
                      • Instruction Fuzzy Hash: 97514C75A44209EFCB15DFA8CC85EAEBBB9EF48710F24842EF94AD7210D735A841CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00730B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00716C6C,?,00008000), ref: 00730BB7
                        • Part of subcall function 007148AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007148A1,?,?,007137C0,?), ref: 007148CE
                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00716D0D
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00716E5A
                        • Part of subcall function 007159CD: _wcscpy.LIBCMT ref: 00715A05
                        • Part of subcall function 0073387D: _iswctype.LIBCMT ref: 00733885
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                      • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                      • API String ID: 537147316-1018226102
                      • Opcode ID: 3db80c559e51313322324f8fa3cfcc86d59da3fbed69ca1d7e5aaac5d1581b02
                      • Instruction ID: 1808dc6413d916140e657e3d9399550c9c67c040789053984309e3a7afe58cf8
                      • Opcode Fuzzy Hash: 3db80c559e51313322324f8fa3cfcc86d59da3fbed69ca1d7e5aaac5d1581b02
                      • Instruction Fuzzy Hash: 13028D71108341DFC728EF28C885AAFBBE5BF95354F04491DF486972A2DB38D989CB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 007145F9
                      • GetMenuItemCount.USER32(007D6890), ref: 0074D7CD
                      • GetMenuItemCount.USER32(007D6890), ref: 0074D87D
                      • GetCursorPos.USER32(?), ref: 0074D8C1
                      • SetForegroundWindow.USER32(00000000), ref: 0074D8CA
                      • TrackPopupMenuEx.USER32(007D6890,00000000,?,00000000,00000000,00000000), ref: 0074D8DD
                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0074D8E9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                      • String ID:
                      • API String ID: 2751501086-0
                      • Opcode ID: 3de510869fca151d1ae65e31553f5900763fb24d7767b3cdc9bafc8bbffbe56f
                      • Instruction ID: d9f743cc0fa8e1c0f165cd2f184b526511e24eb74aba1dcb16e264cf670bb26f
                      • Opcode Fuzzy Hash: 3de510869fca151d1ae65e31553f5900763fb24d7767b3cdc9bafc8bbffbe56f
                      • Instruction Fuzzy Hash: 01710670600205BEEB318F24DC49FAABF64FF05368F204216F529A61E1C7B96C60DB95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • VariantInit.OLEAUT32(?), ref: 00788BEC
                      • CoInitialize.OLE32(00000000), ref: 00788C19
                      • CoUninitialize.OLE32 ref: 00788C23
                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00788D23
                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00788E50
                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,007A2C0C), ref: 00788E84
                      • CoGetObject.OLE32(?,00000000,007A2C0C,?), ref: 00788EA7
                      • SetErrorMode.KERNEL32(00000000), ref: 00788EBA
                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00788F3A
                      • VariantClear.OLEAUT32(?), ref: 00788F4A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                      • String ID: ,,z
                      • API String ID: 2395222682-1207407898
                      • Opcode ID: de2b3831e4666a7dc0b96e3d2d1668bb003b1b0b2a6d8fe780eb1b35011618dd
                      • Instruction ID: 42106fee5f557e6dc4f78dd7c0c5b8575f2eabba7c4dd6b05b39db3e38b9784e
                      • Opcode Fuzzy Hash: de2b3831e4666a7dc0b96e3d2d1668bb003b1b0b2a6d8fe780eb1b35011618dd
                      • Instruction Fuzzy Hash: 0FC12471208305AFC740EF68C88492AB7E9BF89748F44496DF589DB251DB35ED06CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00790038,?,?), ref: 007910BC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: BuffCharUpper
                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                      • API String ID: 3964851224-909552448
                      • Opcode ID: 5cb7be45d07b1a61225b08199cc74525d8a3cd78b25941a23b844c3281f4c05b
                      • Instruction ID: 9784c5b8e4937fefc214a9b5169ad5c502b771fbacc0574a57f7762a8f153590
                      • Opcode Fuzzy Hash: 5cb7be45d07b1a61225b08199cc74525d8a3cd78b25941a23b844c3281f4c05b
                      • Instruction Fuzzy Hash: F0411C3025024FDBDF14EFA4E895AEA3779BF11340F904468FC915B292D738A96AC790
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00717D2C: _memmove.LIBCMT ref: 00717D66
                        • Part of subcall function 00717A84: _memmove.LIBCMT ref: 00717B0D
                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007755D2
                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007755E8
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007755F9
                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0077560B
                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0077561C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: SendString$_memmove
                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                      • API String ID: 2279737902-1007645807
                      • Opcode ID: 443ce8c222501376910bfb5040cb16b09f8c4139e00a360081229ad95efa0321
                      • Instruction ID: 6b11b8aa3e1f31327779b0f5fc8a8d826195aaacafca428f8281eb33d8e64c86
                      • Opcode Fuzzy Hash: 443ce8c222501376910bfb5040cb16b09f8c4139e00a360081229ad95efa0321
                      • Instruction Fuzzy Hash: 7311E2606501ADB9DB24A7A5CC5AEFFBB7CEF91F44F40442DB404A20C1DEA80D45C5A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                      • String ID: 0.0.0.0
                      • API String ID: 208665112-3771769585
                      • Opcode ID: a0835316c36e4f29004f6acd9fc249520d2154b36333e9faa761023808167a71
                      • Instruction ID: c798ccdcebc513d896143cc0a76f9999f930e4645ae0226cb74ca948b0518a50
                      • Opcode Fuzzy Hash: a0835316c36e4f29004f6acd9fc249520d2154b36333e9faa761023808167a71
                      • Instruction Fuzzy Hash: 0411E731A04115EBDF24EB64EC4AEDB77BCDF01760F048176F548D6092EF7CAA828A51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • timeGetTime.WINMM ref: 0077521C
                        • Part of subcall function 00730719: timeGetTime.WINMM(?,75C0B400,00720FF9), ref: 0073071D
                      • Sleep.KERNEL32(0000000A), ref: 00775248
                      • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 0077526C
                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0077528E
                      • SetActiveWindow.USER32 ref: 007752AD
                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007752BB
                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 007752DA
                      • Sleep.KERNEL32(000000FA), ref: 007752E5
                      • IsWindow.USER32 ref: 007752F1
                      • EndDialog.USER32(00000000), ref: 00775302
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                      • String ID: BUTTON
                      • API String ID: 1194449130-3405671355
                      • Opcode ID: 92413b4d734ac2576e381a84a7bbf09d5bc5e9587b0c0b8890487491ce51bf19
                      • Instruction ID: ab84665706fc99e786d0d808a44202c4275787099dbe1df9058ecf49c1e01471
                      • Opcode Fuzzy Hash: 92413b4d734ac2576e381a84a7bbf09d5bc5e9587b0c0b8890487491ce51bf19
                      • Instruction Fuzzy Hash: A92162B1205704AFEB045B60ED89B253B7AFB543C6F10D42AF40AC1171DBAD9C61D77A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00719997: __itow.LIBCMT ref: 007199C2
                        • Part of subcall function 00719997: __swprintf.LIBCMT ref: 00719A0C
                      • CoInitialize.OLE32(00000000), ref: 0077D855
                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0077D8E8
                      • SHGetDesktopFolder.SHELL32(?), ref: 0077D8FC
                      • CoCreateInstance.OLE32(007A2D7C,00000000,00000001,007CA89C,?), ref: 0077D948
                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0077D9B7
                      • CoTaskMemFree.OLE32(?,?), ref: 0077DA0F
                      • _memset.LIBCMT ref: 0077DA4C
                      • SHBrowseForFolderW.SHELL32(?), ref: 0077DA88
                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0077DAAB
                      • CoTaskMemFree.OLE32(00000000), ref: 0077DAB2
                      • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0077DAE9
                      • CoUninitialize.OLE32(00000001,00000000), ref: 0077DAEB
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                      • String ID:
                      • API String ID: 1246142700-0
                      • Opcode ID: 1725354ce2ba994996755793b3ad65b1c28cdbb724a5464a86829c2bd1282ac4
                      • Instruction ID: 07f0316c26364c402d8d4a638fe7b7fbe52c4493cea46070fa892cd02927021b
                      • Opcode Fuzzy Hash: 1725354ce2ba994996755793b3ad65b1c28cdbb724a5464a86829c2bd1282ac4
                      • Instruction Fuzzy Hash: 24B10B75A00109EFDB14DFA4C888DAEBBB9FF48354B148469F909EB261DB34ED42CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetKeyboardState.USER32(?), ref: 007705A7
                      • SetKeyboardState.USER32(?), ref: 00770612
                      • GetAsyncKeyState.USER32(000000A0), ref: 00770632
                      • GetKeyState.USER32(000000A0), ref: 00770649
                      • GetAsyncKeyState.USER32(000000A1), ref: 00770678
                      • GetKeyState.USER32(000000A1), ref: 00770689
                      • GetAsyncKeyState.USER32(00000011), ref: 007706B5
                      • GetKeyState.USER32(00000011), ref: 007706C3
                      • GetAsyncKeyState.USER32(00000012), ref: 007706EC
                      • GetKeyState.USER32(00000012), ref: 007706FA
                      • GetAsyncKeyState.USER32(0000005B), ref: 00770723
                      • GetKeyState.USER32(0000005B), ref: 00770731
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: State$Async$Keyboard
                      • String ID:
                      • API String ID: 541375521-0
                      • Opcode ID: 57626c10e61853599ae495823aac88cc8615613ffa1e34f8a8fec2f2b2370d17
                      • Instruction ID: 7620d9065d03271be78c7e739dee76a0090c3be47db67b3389e203ec1a69c659
                      • Opcode Fuzzy Hash: 57626c10e61853599ae495823aac88cc8615613ffa1e34f8a8fec2f2b2370d17
                      • Instruction Fuzzy Hash: 2F51EE20A0478899FF35DBB48855BEABFB49F013C0F48C59AD5CA5A1C2D65CAB4CCBD1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetDlgItem.USER32(?,00000001), ref: 0076C746
                      • GetWindowRect.USER32(00000000,?), ref: 0076C758
                      • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0076C7B6
                      • GetDlgItem.USER32(?,00000002), ref: 0076C7C1
                      • GetWindowRect.USER32(00000000,?), ref: 0076C7D3
                      • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0076C827
                      • GetDlgItem.USER32(?,000003E9), ref: 0076C835
                      • GetWindowRect.USER32(00000000,?), ref: 0076C846
                      • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0076C889
                      • GetDlgItem.USER32(?,000003EA), ref: 0076C897
                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0076C8B4
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0076C8C1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$ItemMoveRect$Invalidate
                      • String ID:
                      • API String ID: 3096461208-0
                      • Opcode ID: bbd990ea9a464560ec7e4a1bb8e10f5a4eb48c04edc856ab035ee6595be4c4de
                      • Instruction ID: ae2489373cf94ea037a3a1e94d978958639102f0b35fa7301182f476eaba3df4
                      • Opcode Fuzzy Hash: bbd990ea9a464560ec7e4a1bb8e10f5a4eb48c04edc856ab035ee6595be4c4de
                      • Instruction Fuzzy Hash: A2515E71B00205AFDB18CFA8DD89ABEBBBAEB88310F14812DF916D7290D7749D41CB54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00711B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00712036,?,00000000,?,?,?,?,007116CB,00000000,?), ref: 00711B9A
                      • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 007120D3
                      • KillTimer.USER32(-00000001,?,?,?,?,007116CB,00000000,?,?,00711AE2,?,?), ref: 0071216E
                      • DestroyAcceleratorTable.USER32(00000000), ref: 0074BEF6
                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007116CB,00000000,?,?,00711AE2,?,?), ref: 0074BF27
                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007116CB,00000000,?,?,00711AE2,?,?), ref: 0074BF3E
                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007116CB,00000000,?,?,00711AE2,?,?), ref: 0074BF5A
                      • DeleteObject.GDI32(00000000), ref: 0074BF6C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                      • String ID:
                      • API String ID: 641708696-0
                      • Opcode ID: 9792d49e92611dab6dd10255e33dfa0cfa53dcc7cafea011106ad6762037fed4
                      • Instruction ID: adf9891a3039f9c36e26b2619eb9a4e4c80339ec8db72bd3abb862490e6d4308
                      • Opcode Fuzzy Hash: 9792d49e92611dab6dd10255e33dfa0cfa53dcc7cafea011106ad6762037fed4
                      • Instruction Fuzzy Hash: 69618A31101614EFCB35DF18DD48B6AB7F2FB44312F10852AE14686AA1C77DACA6EF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 007125DB: GetWindowLongW.USER32(?,000000EB), ref: 007125EC
                      • GetSysColor.USER32(0000000F), ref: 007121D3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ColorLongWindow
                      • String ID:
                      • API String ID: 259745315-0
                      • Opcode ID: cfb56d58de3ab668b79da0456fbc152f7e3961d5347ad20a62adf44a7f2d1557
                      • Instruction ID: fcc0ee455ee04ee5657cec65d54eaf7334119b17ae61a1bfb4b82486f7663189
                      • Opcode Fuzzy Hash: cfb56d58de3ab668b79da0456fbc152f7e3961d5347ad20a62adf44a7f2d1557
                      • Instruction Fuzzy Hash: A7416E31100144ABDB255F2CDC88BF93B65EB06331F298266FD658A1E6C7398C93DB65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CharLowerBuffW.USER32(?,?,0079F910), ref: 0077AB76
                      • GetDriveTypeW.KERNEL32(00000061,007CA620,00000061), ref: 0077AC40
                      • _wcscpy.LIBCMT ref: 0077AC6A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: BuffCharDriveLowerType_wcscpy
                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                      • API String ID: 2820617543-1000479233
                      • Opcode ID: 96473a3f74c07cf92d4ec2ce9e2d59b433094a90bb4f2e0e0e07a0fdde9f3242
                      • Instruction ID: fa8eeb4064b17bedc3403581adfd7646b4bb59eeb5f4bf63a748f51919328103
                      • Opcode Fuzzy Hash: 96473a3f74c07cf92d4ec2ce9e2d59b433094a90bb4f2e0e0e07a0fdde9f3242
                      • Instruction Fuzzy Hash: A551C570204305EBDB14EF14C895AAFB7A5EF80345F10882DF585572E2D739D94ACA53
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00712612: GetWindowLongW.USER32(?,000000EB), ref: 00712623
                        • Part of subcall function 00712344: GetCursorPos.USER32(?), ref: 00712357
                        • Part of subcall function 00712344: ScreenToClient.USER32(007D67B0,?), ref: 00712374
                        • Part of subcall function 00712344: GetAsyncKeyState.USER32(00000001), ref: 00712399
                        • Part of subcall function 00712344: GetAsyncKeyState.USER32(00000002), ref: 007123A7
                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 0079C2E4
                      • ImageList_EndDrag.COMCTL32 ref: 0079C2EA
                      • ReleaseCapture.USER32 ref: 0079C2F0
                      • SetWindowTextW.USER32(?,00000000), ref: 0079C39A
                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0079C3AD
                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 0079C48F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                      • String ID: @GUI_DRAGFILE$@GUI_DROPID$pr}$pr}
                      • API String ID: 1924731296-3786841344
                      • Opcode ID: 40fb95c328e2c867c9824eb403487ab056a4823958c01fb6646ed95b085c3778
                      • Instruction ID: 0cde6c0beb91179883327602297f60d4533f5804b59ad6eb15e0ca5f5121c05b
                      • Opcode Fuzzy Hash: 40fb95c328e2c867c9824eb403487ab056a4823958c01fb6646ed95b085c3778
                      • Instruction Fuzzy Hash: 39518B70204344EFDB04DF24D89AFAA7BF5EB88310F00852EF5958B2E1DB38A955DB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __i64tow__itow__swprintf
                      • String ID: %.15g$0x%p$False$True
                      • API String ID: 421087845-2263619337
                      • Opcode ID: e5ec41e905fc10f0d1107368a45f06404653b11aad0dbe4ca87ee7217c127f97
                      • Instruction ID: fd32ca6c9a854759b227555bca721205319c5f9fbc2b3a5f167862336cf78d60
                      • Opcode Fuzzy Hash: e5ec41e905fc10f0d1107368a45f06404653b11aad0dbe4ca87ee7217c127f97
                      • Instruction Fuzzy Hash: 2841B671614205EFEB249F38DC56FB673E8EB44300F24446EE649D7292EB79A942CB11
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 007973D9
                      • CreateMenu.USER32 ref: 007973F4
                      • SetMenu.USER32(?,00000000), ref: 00797403
                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00797490
                      • IsMenu.USER32(?), ref: 007974A6
                      • CreatePopupMenu.USER32 ref: 007974B0
                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007974DD
                      • DrawMenuBar.USER32 ref: 007974E5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                      • String ID: 0$F
                      • API String ID: 176399719-3044882817
                      • Opcode ID: 3b128f923e5e2d5b47e8c071a85fea51c6bfa12893d5add6821d3341fb7b2ec1
                      • Instruction ID: 6e46665d577952437a2a8f363a8bc37e7f21ad384151bb12f1c6ea8513ee35eb
                      • Opcode Fuzzy Hash: 3b128f923e5e2d5b47e8c071a85fea51c6bfa12893d5add6821d3341fb7b2ec1
                      • Instruction Fuzzy Hash: 4F416674A01249EFDF24DF68E888E9ABBB9FF49300F14402AE91597361D738AD20CB54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 007977CD
                      • CreateCompatibleDC.GDI32(00000000), ref: 007977D4
                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 007977E7
                      • SelectObject.GDI32(00000000,00000000), ref: 007977EF
                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 007977FA
                      • DeleteDC.GDI32(00000000), ref: 00797803
                      • GetWindowLongW.USER32(?,000000EC), ref: 0079780D
                      • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00797821
                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0079782D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                      • String ID: static
                      • API String ID: 2559357485-2160076837
                      • Opcode ID: 84287d41740dc52c4eb98c0e85b8fb4afa4f2d5053abba745dbf3fe7f8270eb1
                      • Instruction ID: ab526d13d9fd54903998e0110a13346efc3a6b26f1d0c97efa46688a8ca6acd8
                      • Opcode Fuzzy Hash: 84287d41740dc52c4eb98c0e85b8fb4afa4f2d5053abba745dbf3fe7f8270eb1
                      • Instruction Fuzzy Hash: 91316D31115219EBDF159FA4EC09FDA3B69FF09360F114225FA15E60A0C739D822DBA8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 0073707B
                        • Part of subcall function 00738D68: __getptd_noexit.LIBCMT ref: 00738D68
                      • __gmtime64_s.LIBCMT ref: 00737114
                      • __gmtime64_s.LIBCMT ref: 0073714A
                      • __gmtime64_s.LIBCMT ref: 00737167
                      • __allrem.LIBCMT ref: 007371BD
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007371D9
                      • __allrem.LIBCMT ref: 007371F0
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0073720E
                      • __allrem.LIBCMT ref: 00737225
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00737243
                      • __invoke_watson.LIBCMT ref: 007372B4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                      • String ID:
                      • API String ID: 384356119-0
                      • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                      • Instruction ID: d404b62c8fbdc670aeb1b4148329f1ba4ed9298286c9c6853fdd9b2fdba42ae6
                      • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                      • Instruction Fuzzy Hash: D471DBB2A04716EBF7289E79CC8575BB3B4BF55320F14422AF914D6682E778D940C790
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 00772A31
                      • GetMenuItemInfoW.USER32(007D6890,000000FF,00000000,00000030), ref: 00772A92
                      • SetMenuItemInfoW.USER32(007D6890,00000004,00000000,00000030), ref: 00772AC8
                      • Sleep.KERNEL32(000001F4), ref: 00772ADA
                      • GetMenuItemCount.USER32(?), ref: 00772B1E
                      • GetMenuItemID.USER32(?,00000000), ref: 00772B3A
                      • GetMenuItemID.USER32(?,-00000001), ref: 00772B64
                      • GetMenuItemID.USER32(?,?), ref: 00772BA9
                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00772BEF
                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00772C03
                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00772C24
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                      • String ID:
                      • API String ID: 4176008265-0
                      • Opcode ID: c9e10509074af79f7a70297ddeb6c13a9f831315489f7ccd7bf74ea00d36a002
                      • Instruction ID: a8acd4d972d777054eedbf45c264915f67c5b4e91f5fac4a76bc5132726d0fb1
                      • Opcode Fuzzy Hash: c9e10509074af79f7a70297ddeb6c13a9f831315489f7ccd7bf74ea00d36a002
                      • Instruction Fuzzy Hash: 9A61A1B0900249EFDF11CF64C888DBE7BB8EB01384F14845AE865D3262E739AD17DB21
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00797214
                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00797217
                      • GetWindowLongW.USER32(?,000000F0), ref: 0079723B
                      • _memset.LIBCMT ref: 0079724C
                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0079725E
                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 007972D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$LongWindow_memset
                      • String ID:
                      • API String ID: 830647256-0
                      • Opcode ID: 9935d0d869140eb960b6cf24c0775d979da78089b86b41c4f2781ab0adc08eea
                      • Instruction ID: 942cd1e8133f76ab5bf9d027fdfe8ac7ae1f7c2ae88e69ca38151e0d425c76e4
                      • Opcode Fuzzy Hash: 9935d0d869140eb960b6cf24c0775d979da78089b86b41c4f2781ab0adc08eea
                      • Instruction Fuzzy Hash: 26617A71A00248AFDB10DFA4DC81EEE77F9EB09710F14416AFA14A73A1D778AD45DBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00767135
                      • SafeArrayAllocData.OLEAUT32(?), ref: 0076718E
                      • VariantInit.OLEAUT32(?), ref: 007671A0
                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 007671C0
                      • VariantCopy.OLEAUT32(?,?), ref: 00767213
                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00767227
                      • VariantClear.OLEAUT32(?), ref: 0076723C
                      • SafeArrayDestroyData.OLEAUT32(?), ref: 00767249
                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00767252
                      • VariantClear.OLEAUT32(?), ref: 00767264
                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0076726F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                      • String ID:
                      • API String ID: 2706829360-0
                      • Opcode ID: 57b4251e24f7290bbe8af20e7154b0a64a3477504ed60af55c2523d5193def99
                      • Instruction ID: 0402acad43f50eef9bf374b184165e449815c9a1e5cba814a5263f608e86df5a
                      • Opcode Fuzzy Hash: 57b4251e24f7290bbe8af20e7154b0a64a3477504ed60af55c2523d5193def99
                      • Instruction Fuzzy Hash: F5412F35A04119EFCB04DF68DC589EEBBB9FF48354F008069E956E7261DB38A946CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00719997: __itow.LIBCMT ref: 007199C2
                        • Part of subcall function 00719997: __swprintf.LIBCMT ref: 00719A0C
                      • CoInitialize.OLE32 ref: 00788718
                      • CoUninitialize.OLE32 ref: 00788723
                      • CoCreateInstance.OLE32(?,00000000,00000017,007A2BEC,?), ref: 00788783
                      • IIDFromString.OLE32(?,?), ref: 007887F6
                      • VariantInit.OLEAUT32(?), ref: 00788890
                      • VariantClear.OLEAUT32(?), ref: 007888F1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                      • API String ID: 834269672-1287834457
                      • Opcode ID: c4399c81ba953eae0aa1368e4dbfca8013a3b810f20cb5caa6c5eed116e60526
                      • Instruction ID: 0f7498d8e71235216ea88c5966b2a346cc8be9c215ffdef7e2d9e61d4c34582d
                      • Opcode Fuzzy Hash: c4399c81ba953eae0aa1368e4dbfca8013a3b810f20cb5caa6c5eed116e60526
                      • Instruction Fuzzy Hash: FF61AB70648301EFD750EF64C848B6ABBE8AF88714F94481DF9859B291CB38ED45CB93
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WSAStartup.WSOCK32(00000101,?), ref: 00785AA6
                      • inet_addr.WSOCK32(?,?,?), ref: 00785AEB
                      • gethostbyname.WSOCK32(?), ref: 00785AF7
                      • IcmpCreateFile.IPHLPAPI ref: 00785B05
                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00785B75
                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00785B8B
                      • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00785C00
                      • WSACleanup.WSOCK32 ref: 00785C06
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                      • String ID: Ping
                      • API String ID: 1028309954-2246546115
                      • Opcode ID: 5a5a4b3afe906dae0e143a05a4fbd8f8e8bad015f6bc804fefd3fd76a4b66d17
                      • Instruction ID: 96b6a8e1749502ce9fc86e01c55a6a7f7d592cb1ff55c19ac391ab5bcb39388d
                      • Opcode Fuzzy Hash: 5a5a4b3afe906dae0e143a05a4fbd8f8e8bad015f6bc804fefd3fd76a4b66d17
                      • Instruction Fuzzy Hash: E6518F71644700DFD710AF24CC49B6ABBE4EF44320F14892AF556DB2E1DB78EC418B55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0077B73B
                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0077B7B1
                      • GetLastError.KERNEL32 ref: 0077B7BB
                      • SetErrorMode.KERNEL32(00000000,READY), ref: 0077B828
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Error$Mode$DiskFreeLastSpace
                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                      • API String ID: 4194297153-14809454
                      • Opcode ID: d09c8a1bb52f5e96e0a24a81fd4ad688d108391b4235aae035f4c3132fcdefbd
                      • Instruction ID: 4b8058276f8af9c1e55dcd5276339d7a8808b40091527b0674a0bb36ba59970d
                      • Opcode Fuzzy Hash: d09c8a1bb52f5e96e0a24a81fd4ad688d108391b4235aae035f4c3132fcdefbd
                      • Instruction Fuzzy Hash: 7E318275A00209EFDB14EF68C889BBE77B8EF84754F10C02AE509D7291DB799942C791
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                        • Part of subcall function 0076B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0076B0E7
                      • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 007694F6
                      • GetDlgCtrlID.USER32 ref: 00769501
                      • GetParent.USER32 ref: 0076951D
                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00769520
                      • GetDlgCtrlID.USER32(?), ref: 00769529
                      • GetParent.USER32(?), ref: 00769545
                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 00769548
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 1536045017-1403004172
                      • Opcode ID: 4644d27af593a09c6c6fe0541f8c66975310c612ace3b6582ad82d44e82a4293
                      • Instruction ID: cb2f82d0d719c84c7e128f0968f4b33758d173c6686116e1f4bf43bbec173684
                      • Opcode Fuzzy Hash: 4644d27af593a09c6c6fe0541f8c66975310c612ace3b6582ad82d44e82a4293
                      • Instruction Fuzzy Hash: B3219574900204FBCF059B64CC89EFEBB79EF45310F10415AFA62972E2DB7D596ADA20
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                        • Part of subcall function 0076B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0076B0E7
                      • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 007695DF
                      • GetDlgCtrlID.USER32 ref: 007695EA
                      • GetParent.USER32 ref: 00769606
                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00769609
                      • GetDlgCtrlID.USER32(?), ref: 00769612
                      • GetParent.USER32(?), ref: 0076962E
                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 00769631
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 1536045017-1403004172
                      • Opcode ID: efe51e6ee3fd789af736862c9484218e7c132f3bdb2c484b56eb91fa3e76f681
                      • Instruction ID: 40d0b3592cb541b34e30202e8d698df7a551a8b006f8766c88a53f4f7991b4c8
                      • Opcode Fuzzy Hash: efe51e6ee3fd789af736862c9484218e7c132f3bdb2c484b56eb91fa3e76f681
                      • Instruction Fuzzy Hash: F921B675A00204FBDF05AB64CC89EFEBB79EF45300F104156FA12971E1DB7D996ADA20
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetParent.USER32 ref: 00769651
                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00769666
                      • _wcscmp.LIBCMT ref: 00769678
                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007696F3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ClassMessageNameParentSend_wcscmp
                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                      • API String ID: 1704125052-3381328864
                      • Opcode ID: a6e3873095f77591e813b2c9392f316e251811d1d519e2cedab865b4b0dcd889
                      • Instruction ID: fa729366e58bd2f148d2ae44bfda0963fd0763c4049a96cfba9c99c0cc44c9e0
                      • Opcode Fuzzy Hash: a6e3873095f77591e813b2c9392f316e251811d1d519e2cedab865b4b0dcd889
                      • Instruction Fuzzy Hash: FE118A76248717FAF6112620EC0FDA6779C9B05770F20012BFF11E50D2FE7E59615658
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __swprintf.LIBCMT ref: 0077419D
                      • __swprintf.LIBCMT ref: 007741AA
                        • Part of subcall function 007338D8: __woutput_l.LIBCMT ref: 00733931
                      • FindResourceW.KERNEL32(?,?,0000000E), ref: 007741D4
                      • LoadResource.KERNEL32(?,00000000), ref: 007741E0
                      • LockResource.KERNEL32(00000000), ref: 007741ED
                      • FindResourceW.KERNEL32(?,?,00000003), ref: 0077420D
                      • LoadResource.KERNEL32(?,00000000), ref: 0077421F
                      • SizeofResource.KERNEL32(?,00000000), ref: 0077422E
                      • LockResource.KERNEL32(?), ref: 0077423A
                      • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 0077429B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                      • String ID:
                      • API String ID: 1433390588-0
                      • Opcode ID: ae81827392464ef413127602934a1f302c562bec3b6df8daa92b283c121625b9
                      • Instruction ID: 68fd9da2167d6755d855ad8f9b3fc248cdefc7244e17d71133eabf27a75007d3
                      • Opcode Fuzzy Hash: ae81827392464ef413127602934a1f302c562bec3b6df8daa92b283c121625b9
                      • Instruction Fuzzy Hash: 6731907160521AABDF119F60EC48EBF7BACFF04341F008526F90AD2151E778DA62CBA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 00771700
                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00770778,?,00000001), ref: 00771714
                      • GetWindowThreadProcessId.USER32(00000000), ref: 0077171B
                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00770778,?,00000001), ref: 0077172A
                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0077173C
                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00770778,?,00000001), ref: 00771755
                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00770778,?,00000001), ref: 00771767
                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00770778,?,00000001), ref: 007717AC
                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00770778,?,00000001), ref: 007717C1
                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00770778,?,00000001), ref: 007717CC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                      • String ID:
                      • API String ID: 2156557900-0
                      • Opcode ID: 8c189e89caef2c45a3e2ff6e8f4c2947a4f1f7264aff7773f658ee9229d72fa1
                      • Instruction ID: 346a9c43e2832dd486585221b2a6953f844216e9a8f32495c18f8728a8c1ad20
                      • Opcode Fuzzy Hash: 8c189e89caef2c45a3e2ff6e8f4c2947a4f1f7264aff7773f658ee9229d72fa1
                      • Instruction Fuzzy Hash: DE31A075601304ABDF299F18DC84B6937BDAB157A2F50C016F808E62A0E77C9D41CB94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Variant$ClearInit$_memset
                      • String ID: ,,z$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                      • API String ID: 2862541840-364764217
                      • Opcode ID: 90e06cf8b258e8bd2c0bdf1e4d331580b6160e61942920474301ed138e3a36ed
                      • Instruction ID: 59964e1bec4711fd8e82fbfd29fd988ec079739b37d162931f1e6f4768973aa8
                      • Opcode Fuzzy Hash: 90e06cf8b258e8bd2c0bdf1e4d331580b6160e61942920474301ed138e3a36ed
                      • Instruction Fuzzy Hash: 0391C070A40219EFDF24EFA5C848FAEB7B8EF85314F148159F615AB280D7789905CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • EnumChildWindows.USER32(?,0076AA64), ref: 0076A9A2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ChildEnumWindows
                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                      • API String ID: 3555792229-1603158881
                      • Opcode ID: b80ff0c79a70953d38ca86434db2fd0da4e038dfd9e8263562349f92443d579d
                      • Instruction ID: a1753c37ada1d57896ce46d22eef2969b8b3160f714b3a1ee21581eb8138fa02
                      • Opcode Fuzzy Hash: b80ff0c79a70953d38ca86434db2fd0da4e038dfd9e8263562349f92443d579d
                      • Instruction Fuzzy Hash: 8191917060060AFADB18DF60C485BE9FBB4BF04314F108129D98BB7191DB387A99DF91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetWindowLongW.USER32(?,000000EB), ref: 00712EAE
                        • Part of subcall function 00711DB3: GetClientRect.USER32(?,?), ref: 00711DDC
                        • Part of subcall function 00711DB3: GetWindowRect.USER32(?,?), ref: 00711E1D
                        • Part of subcall function 00711DB3: ScreenToClient.USER32(?,?), ref: 00711E45
                      • GetDC.USER32 ref: 0074CF82
                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0074CF95
                      • SelectObject.GDI32(00000000,00000000), ref: 0074CFA3
                      • SelectObject.GDI32(00000000,00000000), ref: 0074CFB8
                      • ReleaseDC.USER32(?,00000000), ref: 0074CFC0
                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0074D04B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                      • String ID: U
                      • API String ID: 4009187628-3372436214
                      • Opcode ID: 1f42f00432fcf9a8b3ef30fcdf7dd2e026c5f18eadeb7531bf358e66d1d33a1b
                      • Instruction ID: b22f6cc55f44d2b1a667dba0f768e6c9a371e33ee0c479822bb43fe931ef42c6
                      • Opcode Fuzzy Hash: 1f42f00432fcf9a8b3ef30fcdf7dd2e026c5f18eadeb7531bf358e66d1d33a1b
                      • Instruction Fuzzy Hash: 6D71C431501205DFCF21CF68C884AEA7BB6FF49350F14826AED959B1A6C73D8C96DB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0079F910), ref: 0078903D
                      • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0079F910), ref: 00789071
                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 007891EB
                      • SysFreeString.OLEAUT32(?), ref: 00789215
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Free$FileLibraryModuleNamePathQueryStringType
                      • String ID:
                      • API String ID: 560350794-0
                      • Opcode ID: bd357a5b9b35183d91768baf00f2aaec3b7d7f222be321d39728db1698100a05
                      • Instruction ID: 9c19246b62d3fdbf84fcc3f6a92a8ce404e2ce1c745c86d762d6d4d5df753b8b
                      • Opcode Fuzzy Hash: bd357a5b9b35183d91768baf00f2aaec3b7d7f222be321d39728db1698100a05
                      • Instruction Fuzzy Hash: B0F12971A40109EFCB14EF94C888EBEB7B9BF49314F148059F616AB290DB35AE46CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 0078F9C9
                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0078FB5C
                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0078FB80
                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0078FBC0
                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0078FBE2
                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0078FD5E
                      • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0078FD90
                      • CloseHandle.KERNEL32(?), ref: 0078FDBF
                      • CloseHandle.KERNEL32(?), ref: 0078FE36
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                      • String ID:
                      • API String ID: 4090791747-0
                      • Opcode ID: b185f7ac22a371e6288278ab9e79079d99cb9de8ffd62755c659cd542a6a9c0c
                      • Instruction ID: 52d9797da378fa43cfa94689e1a01eae70e04a9aa8aab468e2115750ff968cda
                      • Opcode Fuzzy Hash: b185f7ac22a371e6288278ab9e79079d99cb9de8ffd62755c659cd542a6a9c0c
                      • Instruction Fuzzy Hash: E8E1D131244301DFCB14EF24C895A6ABBE0EF85350F14886DF9998B2A2DB39EC41CB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 007748AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007738D3,?), ref: 007748C7
                        • Part of subcall function 007748AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007738D3,?), ref: 007748E0
                        • Part of subcall function 00774CD3: GetFileAttributesW.KERNEL32(?,00773947), ref: 00774CD4
                      • lstrcmpiW.KERNEL32(?,?), ref: 00774FE2
                      • _wcscmp.LIBCMT ref: 00774FFC
                      • MoveFileW.KERNEL32(?,?), ref: 00775017
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                      • String ID:
                      • API String ID: 793581249-0
                      • Opcode ID: 4b8200086b21db703073fd7083d5e8d47f9d1e9cc5664a9d1956c0c591df3c23
                      • Instruction ID: 0edc814f5347ab6618e45c1764bf0fbf7d43a69a9d08244cbe1263381bf4e35a
                      • Opcode Fuzzy Hash: 4b8200086b21db703073fd7083d5e8d47f9d1e9cc5664a9d1956c0c591df3c23
                      • Instruction Fuzzy Hash: 665185B25087859BCB24DB60C8859DFB3ECAF85341F00492EF189D7152EF78A189C766
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0079896E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: InvalidateRect
                      • String ID:
                      • API String ID: 634782764-0
                      • Opcode ID: be2d64c2a2dc326e4fb485e08c35ac06cadcec0b483bfc2d38094b3f2ec6c77c
                      • Instruction ID: d261a8b4cabfa9a6a587dafcd4a403844751e31fc6cbed6097f62ab3f7429286
                      • Opcode Fuzzy Hash: be2d64c2a2dc326e4fb485e08c35ac06cadcec0b483bfc2d38094b3f2ec6c77c
                      • Instruction Fuzzy Hash: FD51A570500208FFDF609F28EC89FA93B65FB06360F508112F515E62A1DF7DA9909792
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0074C547
                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0074C569
                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0074C581
                      • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0074C59F
                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0074C5C0
                      • DestroyIcon.USER32(00000000), ref: 0074C5CF
                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0074C5EC
                      • DestroyIcon.USER32(?), ref: 0074C5FB
                        • Part of subcall function 0079A71E: DeleteObject.GDI32(00000000), ref: 0079A757
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                      • String ID:
                      • API String ID: 2819616528-0
                      • Opcode ID: faed14530c982b30cc2a110bb9c7e747857e529180efc8aba1fe75eb32c216ea
                      • Instruction ID: 23357b2f226be2e2314cc4cbbc52cba08465d142ed9f043e8d9a43d3e283126b
                      • Opcode Fuzzy Hash: faed14530c982b30cc2a110bb9c7e747857e529180efc8aba1fe75eb32c216ea
                      • Instruction Fuzzy Hash: D75147B4601209EFDB24DF28CC45BAA77B5EB54350F208529F902D72E0DB78EDA1DB64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00768A84,00000B00,?,?), ref: 00768E0C
                      • HeapAlloc.KERNEL32(00000000,?,00768A84,00000B00,?,?), ref: 00768E13
                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00768A84,00000B00,?,?), ref: 00768E28
                      • GetCurrentProcess.KERNEL32(?,00000000,?,00768A84,00000B00,?,?), ref: 00768E30
                      • DuplicateHandle.KERNEL32(00000000,?,00768A84,00000B00,?,?), ref: 00768E33
                      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00768A84,00000B00,?,?), ref: 00768E43
                      • GetCurrentProcess.KERNEL32(00768A84,00000000,?,00768A84,00000B00,?,?), ref: 00768E4B
                      • DuplicateHandle.KERNEL32(00000000,?,00768A84,00000B00,?,?), ref: 00768E4E
                      • CreateThread.KERNEL32(00000000,00000000,00768E74,00000000,00000000,00000000), ref: 00768E68
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                      • String ID:
                      • API String ID: 1957940570-0
                      • Opcode ID: c356f53f100dec3ca379f1bdda6823d9b55e0e68f9586c819effba023ce59996
                      • Instruction ID: 39623971ff93a5d5db34b030b3d157674edb0e8c28774ff0ab77963398c4ea2d
                      • Opcode Fuzzy Hash: c356f53f100dec3ca379f1bdda6823d9b55e0e68f9586c819effba023ce59996
                      • Instruction Fuzzy Hash: E901BFB5280308FFE710AB65DC4DF5B3B6CEB89711F108422FA05DB2A1CA759C01CB64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00767652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0076758C,80070057,?,?,?,0076799D), ref: 0076766F
                        • Part of subcall function 00767652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0076758C,80070057,?,?), ref: 0076768A
                        • Part of subcall function 00767652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0076758C,80070057,?,?), ref: 00767698
                        • Part of subcall function 00767652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0076758C,80070057,?), ref: 007676A8
                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00789B1B
                      • _memset.LIBCMT ref: 00789B28
                      • _memset.LIBCMT ref: 00789C6B
                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00789C97
                      • CoTaskMemFree.OLE32(?), ref: 00789CA2
                      Strings
                      • NULL Pointer assignment, xrefs: 00789CF0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                      • String ID: NULL Pointer assignment
                      • API String ID: 1300414916-2785691316
                      • Opcode ID: 22767d60d60f4e3258ffb65b3b7dbe4b35d5455b5e11e43225e3953f4acfdefb
                      • Instruction ID: 742eb3ce78cb1ede72ac4c132e0c41855c8d2edb4921b60a6a297c704595394a
                      • Opcode Fuzzy Hash: 22767d60d60f4e3258ffb65b3b7dbe4b35d5455b5e11e43225e3953f4acfdefb
                      • Instruction Fuzzy Hash: 60913971D00219EBDF10DFA4DC84EEEBBB9AF08710F24815AF519A7281DB759A45CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00797093
                      • SendMessageW.USER32(?,00001036,00000000,?), ref: 007970A7
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 007970C1
                      • _wcscat.LIBCMT ref: 0079711C
                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00797133
                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00797161
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$Window_wcscat
                      • String ID: SysListView32
                      • API String ID: 307300125-78025650
                      • Opcode ID: 47341c79196a764042e3d324530d59b103bccca70845a82a03464ef5935553d5
                      • Instruction ID: 0efd4ddf1b8722a7d5e52c1da3f814aad1252d9b2c219f18910ede2d81b9471d
                      • Opcode Fuzzy Hash: 47341c79196a764042e3d324530d59b103bccca70845a82a03464ef5935553d5
                      • Instruction Fuzzy Hash: 2C41A170A54308EFEF259F68DC89BEE77A8EF08350F10442AF584E7192D67A9D85CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00773E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00773EB6
                        • Part of subcall function 00773E91: Process32FirstW.KERNEL32(00000000,?), ref: 00773EC4
                        • Part of subcall function 00773E91: CloseHandle.KERNEL32(00000000), ref: 00773F8E
                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0078ECB8
                      • GetLastError.KERNEL32 ref: 0078ECCB
                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0078ECFA
                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 0078ED77
                      • GetLastError.KERNEL32(00000000), ref: 0078ED82
                      • CloseHandle.KERNEL32(00000000), ref: 0078EDB7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                      • String ID: SeDebugPrivilege
                      • API String ID: 2533919879-2896544425
                      • Opcode ID: 01d217ecdae0cff80d6076289221e3960188583e420f3cb340a7ffd3f39d0aba
                      • Instruction ID: abe2bb1f22a32c9d1279197240e1c91a325d798d120fa65a57c6e072af99ffe6
                      • Opcode Fuzzy Hash: 01d217ecdae0cff80d6076289221e3960188583e420f3cb340a7ffd3f39d0aba
                      • Instruction Fuzzy Hash: 5241AC71340200DFDB14EF24CC99FADB7A5AF80714F188459F9469B2C2DB7DA849CBA6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadIconW.USER32(00000000,00007F03), ref: 007732C5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: IconLoad
                      • String ID: blank$info$question$stop$warning
                      • API String ID: 2457776203-404129466
                      • Opcode ID: 22d4c8d8ce227974ee289c25b0e2911bb29c023a9a2bee27b9ca24e94883d617
                      • Instruction ID: b0aeeccf071b3be5d862105350bbae603edd832fb090a2d2cc9d6a3f6bb3f695
                      • Opcode Fuzzy Hash: 22d4c8d8ce227974ee289c25b0e2911bb29c023a9a2bee27b9ca24e94883d617
                      • Instruction Fuzzy Hash: DC116A3124835ABBEF015B54DC47DAAB39CFF193B4F20802EF908A6183E67E5F0016A5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0077454E
                      • LoadStringW.USER32(00000000), ref: 00774555
                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0077456B
                      • LoadStringW.USER32(00000000), ref: 00774572
                      • _wprintf.LIBCMT ref: 00774598
                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007745B6
                      Strings
                      • %s (%d) : ==> %s: %s %s, xrefs: 00774593
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: HandleLoadModuleString$Message_wprintf
                      • String ID: %s (%d) : ==> %s: %s %s
                      • API String ID: 3648134473-3128320259
                      • Opcode ID: 6ac2dbb6a74d8dbdc69a5e782779177df996e41fc51be6dd81cc7ce4885d36d0
                      • Instruction ID: 33414d3c32804dc6d4ea12e6eb61d7eb0803d97dd5bd9e9973c3385d0f82a01a
                      • Opcode Fuzzy Hash: 6ac2dbb6a74d8dbdc69a5e782779177df996e41fc51be6dd81cc7ce4885d36d0
                      • Instruction Fuzzy Hash: 29014FF3940208BFE750A7A09D89EF6776CD708301F0045A6FB49E2051EA789E958B74
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00712612: GetWindowLongW.USER32(?,000000EB), ref: 00712623
                      • GetSystemMetrics.USER32(0000000F), ref: 0079D78A
                      • GetSystemMetrics.USER32(0000000F), ref: 0079D7AA
                      • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0079D9E5
                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0079DA03
                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0079DA24
                      • ShowWindow.USER32(00000003,00000000), ref: 0079DA43
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0079DA68
                      • DefDlgProcW.USER32(?,00000005,?,?), ref: 0079DA8B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                      • String ID:
                      • API String ID: 1211466189-0
                      • Opcode ID: 2e45a166f1d4fa5901427a8350ed7a3d4d84d5688ab84b369b289533f12190d9
                      • Instruction ID: 7e17d95a5044b47e61f39676cbd50edc89c0b9410b640a26020bebe9f8568503
                      • Opcode Fuzzy Hash: 2e45a166f1d4fa5901427a8350ed7a3d4d84d5688ab84b369b289533f12190d9
                      • Instruction Fuzzy Hash: E8B17875600225EBDF24CF69D9897AD7BB1FF04711F08C06AEC489B295D738AD60CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0074C417,00000004,00000000,00000000,00000000), ref: 00712ACF
                      • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0074C417,00000004,00000000,00000000,00000000,000000FF), ref: 00712B17
                      • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0074C417,00000004,00000000,00000000,00000000), ref: 0074C46A
                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0074C417,00000004,00000000,00000000,00000000), ref: 0074C4D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ShowWindow
                      • String ID:
                      • API String ID: 1268545403-0
                      • Opcode ID: bc03ca39dc3f4c3cac1e84fe7d4695eda15b027ee670d7540c9837a9447ede1c
                      • Instruction ID: 3665a2b616f84be586568ee7c32a5232c5e89be7c856e810f8d4cb80476705c6
                      • Opcode Fuzzy Hash: bc03ca39dc3f4c3cac1e84fe7d4695eda15b027ee670d7540c9837a9447ede1c
                      • Instruction Fuzzy Hash: 8C412B312086C0AAC7358B2C9D9C7FA3FA1AF45300F14C41AE447965E2D73D98D3D720
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 0077737F
                        • Part of subcall function 00730FF6: std::exception::exception.LIBCMT ref: 0073102C
                        • Part of subcall function 00730FF6: __CxxThrowException@8.LIBCMT ref: 00731041
                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 007773B6
                      • EnterCriticalSection.KERNEL32(?), ref: 007773D2
                      • _memmove.LIBCMT ref: 00777420
                      • _memmove.LIBCMT ref: 0077743D
                      • LeaveCriticalSection.KERNEL32(?), ref: 0077744C
                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00777461
                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00777480
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                      • String ID:
                      • API String ID: 256516436-0
                      • Opcode ID: 9b6ae07c146248c860feb23bc63f75905d6fa9bd6242c8e63fe0becfc33ca341
                      • Instruction ID: 5ca10a3ba18ae0cdc6d2d061b630edf4f51ca66bb13f8ce1f45e4880fd8b3c2e
                      • Opcode Fuzzy Hash: 9b6ae07c146248c860feb23bc63f75905d6fa9bd6242c8e63fe0becfc33ca341
                      • Instruction Fuzzy Hash: F931AF31904205EBDF14DF64DC89AAE7BB8FF44310F1480A6F904EB246DB389A11CBA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DeleteObject.GDI32(00000000), ref: 0079645A
                      • GetDC.USER32(00000000), ref: 00796462
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0079646D
                      • ReleaseDC.USER32(00000000,00000000), ref: 00796479
                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 007964B5
                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 007964C6
                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00799299,?,?,000000FF,00000000,?,000000FF,?), ref: 00796500
                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00796520
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                      • String ID:
                      • API String ID: 3864802216-0
                      • Opcode ID: 8e4c06661ae87d1794c9565de4aeba0141adafa14026ee7bf1aa766b092dfa7d
                      • Instruction ID: 500488d04a187b7ae66d9b39f2a6f66271fcd9b6abeb09eb02904ad955e98077
                      • Opcode Fuzzy Hash: 8e4c06661ae87d1794c9565de4aeba0141adafa14026ee7bf1aa766b092dfa7d
                      • Instruction Fuzzy Hash: 4D318D72200214BFEF108F50DC8AFEA3FA9EF09761F044066FE08DA295D6799852CB64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memcmp
                      • String ID:
                      • API String ID: 2931989736-0
                      • Opcode ID: 86f905f9f97274624a29b1f8f7fbf1efa8ba933a83d77fff5744f84819261ac4
                      • Instruction ID: 395df8b2a07a30b460bd0038696cba3759feceae4366a11b31de1ab66a676118
                      • Opcode Fuzzy Hash: 86f905f9f97274624a29b1f8f7fbf1efa8ba933a83d77fff5744f84819261ac4
                      • Instruction Fuzzy Hash: 012183E1640209F7A616A6258D47FBB335CAE523A4F444020FD8796283EB5DDD12C1A5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00719997: __itow.LIBCMT ref: 007199C2
                        • Part of subcall function 00719997: __swprintf.LIBCMT ref: 00719A0C
                        • Part of subcall function 0072FEC6: _wcscpy.LIBCMT ref: 0072FEE9
                      • _wcstok.LIBCMT ref: 0077EEFF
                      • _wcscpy.LIBCMT ref: 0077EF8E
                      • _memset.LIBCMT ref: 0077EFC1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                      • String ID: X
                      • API String ID: 774024439-3081909835
                      • Opcode ID: 399c0ddf983ca89b290aefc13eb96062ae78c008ad5a405d977e55855b73267b
                      • Instruction ID: 0c94e54ce7633efaea7f524935f3bb19e44e75f57a56b4b43d27dbc1c4f7d84b
                      • Opcode Fuzzy Hash: 399c0ddf983ca89b290aefc13eb96062ae78c008ad5a405d977e55855b73267b
                      • Instruction Fuzzy Hash: 4CC17371508300DFCB14EF28C999A9AB7E4FF85350F00896DF599972A2DB38ED45CB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9eace0290a3a8cbd3e1dd83f72778dfb615ef742e5954a263cdb9ad6bb5d083f
                      • Instruction ID: 24abefe495da462e0370a1ad164147fc648e0bf9e15f84c6f690eb8c596fa9bd
                      • Opcode Fuzzy Hash: 9eace0290a3a8cbd3e1dd83f72778dfb615ef742e5954a263cdb9ad6bb5d083f
                      • Instruction Fuzzy Hash: 47716E30900149EFCB04CF98CC49AFEBB79FF85710F548159FA15AA291C738AA91CFA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7eea52316f44d08f04c33dbef9acf10a36a9a0837965ab76eb179ecef09bedbd
                      • Instruction ID: 232b13464de64314ed2806f94ebf0a219dd0fe2f92699f1a677647d3122825a2
                      • Opcode Fuzzy Hash: 7eea52316f44d08f04c33dbef9acf10a36a9a0837965ab76eb179ecef09bedbd
                      • Instruction Fuzzy Hash: 1C61FF71548300EBC714EF28CC8AEAFB7E9AF84714F508919F5469B2E2DA38DD45C792
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • IsWindow.USER32(011E7658), ref: 0079B6A5
                      • IsWindowEnabled.USER32(011E7658), ref: 0079B6B1
                      • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0079B795
                      • SendMessageW.USER32(011E7658,000000B0,?,?), ref: 0079B7CC
                      • IsDlgButtonChecked.USER32(?,?), ref: 0079B809
                      • GetWindowLongW.USER32(011E7658,000000EC), ref: 0079B82B
                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0079B843
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                      • String ID:
                      • API String ID: 4072528602-0
                      • Opcode ID: c0b3adbc66076c4be8396543acb5aad58ecfe6f17bb679cf8c0a01f33e3e22cd
                      • Instruction ID: 53be78caa3d1a9a7dc86bc32a29972e7287780fc008502a57e788df2a5e40022
                      • Opcode Fuzzy Hash: c0b3adbc66076c4be8396543acb5aad58ecfe6f17bb679cf8c0a01f33e3e22cd
                      • Instruction Fuzzy Hash: 4E71AD34600204EFDF209FA4FAD4FAA7BB9FF89310F14416AE945973A1C739A951CB64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 0078F75C
                      • _memset.LIBCMT ref: 0078F825
                      • ShellExecuteExW.SHELL32(?), ref: 0078F86A
                        • Part of subcall function 00719997: __itow.LIBCMT ref: 007199C2
                        • Part of subcall function 00719997: __swprintf.LIBCMT ref: 00719A0C
                        • Part of subcall function 0072FEC6: _wcscpy.LIBCMT ref: 0072FEE9
                      • GetProcessId.KERNEL32(00000000), ref: 0078F8E1
                      • CloseHandle.KERNEL32(00000000), ref: 0078F910
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                      • String ID: @
                      • API String ID: 3522835683-2766056989
                      • Opcode ID: f0e64273ad1a69e8b937db5726c9944e6f67c06e1054b8957c7baa5e57703dff
                      • Instruction ID: 2d636f7988d03ff4ed392da72d008b834e2a1227c646cbbb76a53a66814e2cf8
                      • Opcode Fuzzy Hash: f0e64273ad1a69e8b937db5726c9944e6f67c06e1054b8957c7baa5e57703dff
                      • Instruction Fuzzy Hash: 8261AE75A00619DFCF14EF68C4949AEBBF5FF48310F148469E846AB391DB38AD81CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetParent.USER32(?), ref: 0077149C
                      • GetKeyboardState.USER32(?), ref: 007714B1
                      • SetKeyboardState.USER32(?), ref: 00771512
                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 00771540
                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 0077155F
                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 007715A5
                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007715C8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessagePost$KeyboardState$Parent
                      • String ID:
                      • API String ID: 87235514-0
                      • Opcode ID: 07d2ff739a454fa336df3ae519afaf2e7d13617d3c7cc44ecc2cbc359f7a7992
                      • Instruction ID: b743e2050ebed5b54676f22114609566c421b4dfd19b2e8f954c07f57a8c8606
                      • Opcode Fuzzy Hash: 07d2ff739a454fa336df3ae519afaf2e7d13617d3c7cc44ecc2cbc359f7a7992
                      • Instruction Fuzzy Hash: F151E3A06047D53EFF3A463C8C45BBA7FA95B46384F4CC489E1D9998C2C69CDCA4D750
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetParent.USER32(00000000), ref: 007712B5
                      • GetKeyboardState.USER32(?), ref: 007712CA
                      • SetKeyboardState.USER32(?), ref: 0077132B
                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00771357
                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00771374
                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007713B8
                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007713D9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessagePost$KeyboardState$Parent
                      • String ID:
                      • API String ID: 87235514-0
                      • Opcode ID: dfea12b214c0610ffa4234a9f06bad55ba0b904e11ae67ac5337372c5c054576
                      • Instruction ID: a6b92ef3cf1011c424cd7ad186f6e4cd542f0e00fde63acbfee0c2df43c1c36a
                      • Opcode Fuzzy Hash: dfea12b214c0610ffa4234a9f06bad55ba0b904e11ae67ac5337372c5c054576
                      • Instruction Fuzzy Hash: 8251F4A06047D57DFF3683288C45B7ABFA96B06380F48C589E1DC9A8C2D398EC94D750
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _wcsncpy$LocalTime
                      • String ID:
                      • API String ID: 2945705084-0
                      • Opcode ID: bfe22523bebf9afa98832e04bdfe21ed8494e4b44bfbafeb33476f6bfe25266d
                      • Instruction ID: 9be7347e719f312b63817d5c2e32985bfb47403f37edae5fc1ac826de916516b
                      • Opcode Fuzzy Hash: bfe22523bebf9afa98832e04bdfe21ed8494e4b44bfbafeb33476f6bfe25266d
                      • Instruction Fuzzy Hash: D0418365C20528B6DB10EBB4888A9CF77B8AF04710F508966F618E3123F639E755C7A9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0076DAC5
                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0076DAFB
                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0076DB0C
                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0076DB8E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ErrorMode$AddressCreateInstanceProc
                      • String ID: ,,z$DllGetClassObject
                      • API String ID: 753597075-4073682629
                      • Opcode ID: 00e953310fbad76556f79eedf6e4d4d15986e0510823244f8aa4e35aab2306a2
                      • Instruction ID: a35d62378d01734625e1123170d6c3e4337797049c854ba421285e5bf2cb5c48
                      • Opcode Fuzzy Hash: 00e953310fbad76556f79eedf6e4d4d15986e0510823244f8aa4e35aab2306a2
                      • Instruction Fuzzy Hash: 484176B1B10208DFDB25CF54C884A9A7BA9EF45350F1581AEED0ADF209D7B9DD40DBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 007748AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007738D3,?), ref: 007748C7
                        • Part of subcall function 007748AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007738D3,?), ref: 007748E0
                      • lstrcmpiW.KERNEL32(?,?), ref: 007738F3
                      • _wcscmp.LIBCMT ref: 0077390F
                      • MoveFileW.KERNEL32(?,?), ref: 00773927
                      • _wcscat.LIBCMT ref: 0077396F
                      • SHFileOperationW.SHELL32(?), ref: 007739DB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                      • String ID: \*.*
                      • API String ID: 1377345388-1173974218
                      • Opcode ID: ce98f55ccba41d918bdd94109e2cefac4c984e617ae6394fde08eb3ab7bfe807
                      • Instruction ID: 7c6b2f3462bfb6fe139b4581e336bea12cd16d4dd28b3309ce975f6fe74d33f2
                      • Opcode Fuzzy Hash: ce98f55ccba41d918bdd94109e2cefac4c984e617ae6394fde08eb3ab7bfe807
                      • Instruction Fuzzy Hash: 7D4162B250C3449ACB51EF64C885ADFB7E8AF88384F44492EF589C3151EB7CD689CB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 00797519
                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007975C0
                      • IsMenu.USER32(?), ref: 007975D8
                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00797620
                      • DrawMenuBar.USER32 ref: 00797633
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Menu$Item$DrawInfoInsert_memset
                      • String ID: 0
                      • API String ID: 3866635326-4108050209
                      • Opcode ID: f9d51fd076f0efae8585ca53064439b1df91bbc6dd5910d0fe468ef31b82b975
                      • Instruction ID: 253e3d0d22620c2931b51cd0d3ade40713ead5154e79bbc12ff486922f79c7c9
                      • Opcode Fuzzy Hash: f9d51fd076f0efae8585ca53064439b1df91bbc6dd5910d0fe468ef31b82b975
                      • Instruction Fuzzy Hash: B5415675A15608EFDF24DF58E884E9ABBF9FF08310F04802AE91597290D738AD50CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 0079125C
                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00791286
                      • FreeLibrary.KERNEL32(00000000), ref: 0079133D
                        • Part of subcall function 0079122D: RegCloseKey.ADVAPI32(?), ref: 007912A3
                        • Part of subcall function 0079122D: FreeLibrary.KERNEL32(?), ref: 007912F5
                        • Part of subcall function 0079122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00791318
                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 007912E0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: EnumFreeLibrary$CloseDeleteOpen
                      • String ID:
                      • API String ID: 395352322-0
                      • Opcode ID: 6bd04e724b1366a9f7a72d89e13457278db172ea68e792511a95bb63e8035210
                      • Instruction ID: e3323a1f19415e08949492d358b566d331dd203f69d5f30415246be90beb45be
                      • Opcode Fuzzy Hash: 6bd04e724b1366a9f7a72d89e13457278db172ea68e792511a95bb63e8035210
                      • Instruction Fuzzy Hash: F6312D71A0110ABFDF15DB94EC89AFEB7BCEF08300F40416AE501E2151EA789E559BA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 0079655B
                      • GetWindowLongW.USER32(011E7658,000000F0), ref: 0079658E
                      • GetWindowLongW.USER32(011E7658,000000F0), ref: 007965C3
                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 007965F5
                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 0079661F
                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00796630
                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0079664A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: LongWindow$MessageSend
                      • String ID:
                      • API String ID: 2178440468-0
                      • Opcode ID: 21f2c34814d23e83d62f7303f14b24e09533f4f8bc8fd6954b28aa9abf0ae639
                      • Instruction ID: bc3ec6524a21c5860f92053c64ef1d42f7969f5a57722b6c2904b6c3935f2e14
                      • Opcode Fuzzy Hash: 21f2c34814d23e83d62f7303f14b24e09533f4f8bc8fd6954b28aa9abf0ae639
                      • Instruction Fuzzy Hash: AC31F230604250AFDF21CF18EC85F553BE1FB4A750F1A42A9F511CB2B5CB69E860DB55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 007880A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 007880CB
                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 007864D9
                      • WSAGetLastError.WSOCK32(00000000), ref: 007864E8
                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00786521
                      • connect.WSOCK32(00000000,?,00000010), ref: 0078652A
                      • WSAGetLastError.WSOCK32 ref: 00786534
                      • closesocket.WSOCK32(00000000), ref: 0078655D
                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00786576
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                      • String ID:
                      • API String ID: 910771015-0
                      • Opcode ID: 42f95738ec7e3e11ec172bc8361a001eb5f553814f8e4f2133de87d03f0509e1
                      • Instruction ID: dbe25e8387632c7ab6dca17654d118219c9e77cca67889e2b9fe5fe0de8584dd
                      • Opcode Fuzzy Hash: 42f95738ec7e3e11ec172bc8361a001eb5f553814f8e4f2133de87d03f0509e1
                      • Instruction Fuzzy Hash: C3318131640118ABDB10AF64CC89FBE7BA9EB44724F048069F949E7291DB78AD45CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0076E0FA
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0076E120
                      • SysAllocString.OLEAUT32(00000000), ref: 0076E123
                      • SysAllocString.OLEAUT32 ref: 0076E144
                      • SysFreeString.OLEAUT32 ref: 0076E14D
                      • StringFromGUID2.OLE32(?,?,00000028), ref: 0076E167
                      • SysAllocString.OLEAUT32(?), ref: 0076E175
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                      • String ID:
                      • API String ID: 3761583154-0
                      • Opcode ID: de13d2e97ea63be303fd01297ad686e131fe1848f24e8f79fb6eeeeaf71f10c8
                      • Instruction ID: 9369fc3244fdb5c4e75f11f8174495934eddf4ec29e8d9e2d140f784fccadcd7
                      • Opcode Fuzzy Hash: de13d2e97ea63be303fd01297ad686e131fe1848f24e8f79fb6eeeeaf71f10c8
                      • Instruction Fuzzy Hash: 40215379604108AFDB149FA8DC88DAB77ECEB0A760B508136FD15CB261DA78DC419B74
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00711D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00711D73
                        • Part of subcall function 00711D35: GetStockObject.GDI32(00000011), ref: 00711D87
                        • Part of subcall function 00711D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00711D91
                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 007978A1
                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 007978AE
                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 007978B9
                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 007978C8
                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 007978D4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$CreateObjectStockWindow
                      • String ID: Msctls_Progress32
                      • API String ID: 1025951953-3636473452
                      • Opcode ID: 3c6d31255800948c4ff01d1649f42867e0d6ccb0dfbf1933e9d861e631557bb3
                      • Instruction ID: 10b79756d80e1dfb7e072d98e9e2b936dd2ccf51d5dc178ebedc204c931b7d79
                      • Opcode Fuzzy Hash: 3c6d31255800948c4ff01d1649f42867e0d6ccb0dfbf1933e9d861e631557bb3
                      • Instruction Fuzzy Hash: 9E11B2B2110219BFEF159F64DC85EEB7F6DEF08768F014115FA04A6090C7769C21DBA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00734292,?), ref: 007341E3
                      • GetProcAddress.KERNEL32(00000000), ref: 007341EA
                      • EncodePointer.KERNEL32(00000000), ref: 007341F6
                      • DecodePointer.KERNEL32(00000001,00734292,?), ref: 00734213
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                      • String ID: RoInitialize$combase.dll
                      • API String ID: 3489934621-340411864
                      • Opcode ID: f8704df36267a25002374a44a47d5ca78bfca77644ab7b69755de9b2675f28f7
                      • Instruction ID: d4a462d3299d57b720b0f395327fcb9b9362807341bdc05c3859559c255ff13d
                      • Opcode Fuzzy Hash: f8704df36267a25002374a44a47d5ca78bfca77644ab7b69755de9b2675f28f7
                      • Instruction Fuzzy Hash: 06E01AB0692308AFEF205BB4EC0DB043BA4B761706F54C526F511E50A1DBBE50928F08
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,007341B8), ref: 007342B8
                      • GetProcAddress.KERNEL32(00000000), ref: 007342BF
                      • EncodePointer.KERNEL32(00000000), ref: 007342CA
                      • DecodePointer.KERNEL32(007341B8), ref: 007342E5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                      • String ID: RoUninitialize$combase.dll
                      • API String ID: 3489934621-2819208100
                      • Opcode ID: 010f1e2684f7d64cc80512c27c1098447d300bbe5390a7d58cbadf8d151bcb3e
                      • Instruction ID: 460443374c84e1571290d029705e8898fc527a704f55079b142c33b8c7143cf7
                      • Opcode Fuzzy Hash: 010f1e2684f7d64cc80512c27c1098447d300bbe5390a7d58cbadf8d151bcb3e
                      • Instruction Fuzzy Hash: 2AE0B6B9682315EBEB149B64EC0DB053BB4B725742F10C136F011F11A1CBBE9582CA1C
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memmove$__itow__swprintf
                      • String ID:
                      • API String ID: 3253778849-0
                      • Opcode ID: 85db79b2357762b9e250be41096e75e0a8b11e2f4c8f4dceac26103551ccb84f
                      • Instruction ID: c98c09621a120fdccfa3c4b284911213df8b198262715ff38819e7f6f7ae5a4c
                      • Opcode Fuzzy Hash: 85db79b2357762b9e250be41096e75e0a8b11e2f4c8f4dceac26103551ccb84f
                      • Instruction Fuzzy Hash: B761013050065ADBDF15EF24CC99EFE37A8AF44348F048518FA595B1D6DB38AC42CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                        • Part of subcall function 007910A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00790038,?,?), ref: 007910BC
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00790548
                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00790588
                      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 007905AB
                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 007905D4
                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00790617
                      • RegCloseKey.ADVAPI32(00000000), ref: 00790624
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                      • String ID:
                      • API String ID: 4046560759-0
                      • Opcode ID: 8c44941e2b87a8c06880c0185b1f4ab7c45cb6ee1841c791332724b7068f3848
                      • Instruction ID: b8bf8d9173c71862a169376ce713aa1e64344e03d2eb483556e5a6f228beaf83
                      • Opcode Fuzzy Hash: 8c44941e2b87a8c06880c0185b1f4ab7c45cb6ee1841c791332724b7068f3848
                      • Instruction Fuzzy Hash: 55515B31218200EFCB14EB28D889E6ABBE9FF84714F04891DF545871A1DB39E955CB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetMenu.USER32(?), ref: 00795A82
                      • GetMenuItemCount.USER32(00000000), ref: 00795AB9
                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00795AE1
                      • GetMenuItemID.USER32(?,?), ref: 00795B50
                      • GetSubMenu.USER32(?,?), ref: 00795B5E
                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 00795BAF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Menu$Item$CountMessagePostString
                      • String ID:
                      • API String ID: 650687236-0
                      • Opcode ID: 3a51f3160539d3be8e97523831a267bf79a91a86b6bb73eb9590e8cbb04ff7b2
                      • Instruction ID: 3171de829e35ea78c5200549683d4a08308482939fa426bcf83a2663919f7784
                      • Opcode Fuzzy Hash: 3a51f3160539d3be8e97523831a267bf79a91a86b6bb73eb9590e8cbb04ff7b2
                      • Instruction Fuzzy Hash: 06519F71A00625EFDF11EFA4D845AAEBBB4EF48320F108469E915B7351CB78AE41CB94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • VariantInit.OLEAUT32(?), ref: 0076F3F7
                      • VariantClear.OLEAUT32(00000013), ref: 0076F469
                      • VariantClear.OLEAUT32(00000000), ref: 0076F4C4
                      • _memmove.LIBCMT ref: 0076F4EE
                      • VariantClear.OLEAUT32(?), ref: 0076F53B
                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0076F569
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Variant$Clear$ChangeInitType_memmove
                      • String ID:
                      • API String ID: 1101466143-0
                      • Opcode ID: 7e08e9693ffe8d1496fcde4d1c073a41e47571accdc9dda16fa7c89a69093645
                      • Instruction ID: bd1612889204e91f2298139c0aa97a56cc3c9768a3e45a13d5fa42f814e827e3
                      • Opcode Fuzzy Hash: 7e08e9693ffe8d1496fcde4d1c073a41e47571accdc9dda16fa7c89a69093645
                      • Instruction Fuzzy Hash: 44516CB5A00249DFCB14CF58D884AAAB7B8FF4C314B15816AED5ADB311E734E911CBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 00772747
                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00772792
                      • IsMenu.USER32(00000000), ref: 007727B2
                      • CreatePopupMenu.USER32 ref: 007727E6
                      • GetMenuItemCount.USER32(000000FF), ref: 00772844
                      • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00772875
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                      • String ID:
                      • API String ID: 3311875123-0
                      • Opcode ID: b45badccb3bc7c93d1e5b058888ed62d7ec90053990ec9fa5c862afc34fb54ef
                      • Instruction ID: 85c512126a43f246faf39935fa88012b75fa694ca09ef1ce0bc977b387c4b6dc
                      • Opcode Fuzzy Hash: b45badccb3bc7c93d1e5b058888ed62d7ec90053990ec9fa5c862afc34fb54ef
                      • Instruction Fuzzy Hash: CA51A270A00305DFDF24CF68C888BADBBF5EF44394F108169E4299B292D7799946CB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00712612: GetWindowLongW.USER32(?,000000EB), ref: 00712623
                      • BeginPaint.USER32(?,?,?,?,?,?), ref: 0071179A
                      • GetWindowRect.USER32(?,?), ref: 007117FE
                      • ScreenToClient.USER32(?,?), ref: 0071181B
                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0071182C
                      • EndPaint.USER32(?,?), ref: 00711876
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: PaintWindow$BeginClientLongRectScreenViewport
                      • String ID:
                      • API String ID: 1827037458-0
                      • Opcode ID: c4b66b3e7f5359c4d84b514ad5c71977414c95aebea038d93d38e09bcf68ddd2
                      • Instruction ID: 084b0c4c7f657f083bda693c19ac1692e02342f3c87d1ff757079ecdce7a1e97
                      • Opcode Fuzzy Hash: c4b66b3e7f5359c4d84b514ad5c71977414c95aebea038d93d38e09bcf68ddd2
                      • Instruction Fuzzy Hash: 6A416F712043019FD711DF28DC84BBA7BF8EB49724F148669FA948A2E1C7399885DB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ShowWindow.USER32(007D67B0,00000000,011E7658,?,?,007D67B0,?,0079B862,?,?), ref: 0079B9CC
                      • EnableWindow.USER32(00000000,00000000), ref: 0079B9F0
                      • ShowWindow.USER32(007D67B0,00000000,011E7658,?,?,007D67B0,?,0079B862,?,?), ref: 0079BA50
                      • ShowWindow.USER32(00000000,00000004,?,0079B862,?,?), ref: 0079BA62
                      • EnableWindow.USER32(00000000,00000001), ref: 0079BA86
                      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0079BAA9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$Show$Enable$MessageSend
                      • String ID:
                      • API String ID: 642888154-0
                      • Opcode ID: 3f3c048c4a368e42e083a982c6c7fc955a6c269a354717bfc7a285ff77e25922
                      • Instruction ID: 09a809ef866052a0eb5da5fbd4914d8a8b60e921982cd1c36e57fc4234979908
                      • Opcode Fuzzy Hash: 3f3c048c4a368e42e083a982c6c7fc955a6c269a354717bfc7a285ff77e25922
                      • Instruction Fuzzy Hash: 80414234600241EFDF25CF64E589B957BE1FF05324F1881B9EA488F6A2C739AC46CB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetForegroundWindow.USER32(?,?,?,?,?,?,00785134,?,?,00000000,00000001), ref: 007873BF
                        • Part of subcall function 00783C94: GetWindowRect.USER32(?,?), ref: 00783CA7
                      • GetDesktopWindow.USER32 ref: 007873E9
                      • GetWindowRect.USER32(00000000), ref: 007873F0
                      • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00787422
                        • Part of subcall function 007754E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0077555E
                      • GetCursorPos.USER32(?), ref: 0078744E
                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007874AC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                      • String ID:
                      • API String ID: 4137160315-0
                      • Opcode ID: c4f9a38e7dfe1d266e6ad9048f32f256ba8f084eddb62574e72246151cb9194e
                      • Instruction ID: 2d7b17b7b5e4e8170f1eda90b0268fb6a159900c6021f5bf34514b28c5eb68c8
                      • Opcode Fuzzy Hash: c4f9a38e7dfe1d266e6ad9048f32f256ba8f084eddb62574e72246151cb9194e
                      • Instruction Fuzzy Hash: 82310432508345ABC724EF14D849F9BBBE9FF88344F10491AF489D7191C778E909CB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 007685F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00768608
                        • Part of subcall function 007685F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00768612
                        • Part of subcall function 007685F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00768621
                        • Part of subcall function 007685F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00768628
                        • Part of subcall function 007685F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0076863E
                      • GetLengthSid.ADVAPI32(?,00000000,00768977), ref: 00768DAC
                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00768DB8
                      • HeapAlloc.KERNEL32(00000000), ref: 00768DBF
                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 00768DD8
                      • GetProcessHeap.KERNEL32(00000000,00000000,00768977), ref: 00768DEC
                      • HeapFree.KERNEL32(00000000), ref: 00768DF3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                      • String ID:
                      • API String ID: 3008561057-0
                      • Opcode ID: 8aea1a901c8b64a653c0c05577c7136283a369678e91c520c940f237ab2b4e72
                      • Instruction ID: b0e79c4edadcf8fc73c9da89f248bc73748ef9eb140d64c40bb7dc86a6173f2e
                      • Opcode Fuzzy Hash: 8aea1a901c8b64a653c0c05577c7136283a369678e91c520c940f237ab2b4e72
                      • Instruction Fuzzy Hash: DA11E131640604FFDB549F64CC08BAE7769EF49315F10822AEC46D7250DB399D01CB65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00768B2A
                      • OpenProcessToken.ADVAPI32(00000000), ref: 00768B31
                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00768B40
                      • CloseHandle.KERNEL32(00000004), ref: 00768B4B
                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00768B7A
                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00768B8E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                      • String ID:
                      • API String ID: 1413079979-0
                      • Opcode ID: e4c842803a1d1b6c9bac278b095fdd2f4484c75cbdaf98802ca349d540f720a3
                      • Instruction ID: 34a0dbf0e22690d6428ad6dc0567a1dfb9763e4d35d09d39bdfc15be865232fb
                      • Opcode Fuzzy Hash: e4c842803a1d1b6c9bac278b095fdd2f4484c75cbdaf98802ca349d540f720a3
                      • Instruction Fuzzy Hash: 4A115CB2500209ABDF018FA8DD49FDE7BA9EF08304F044165FE09A2160C7798D659B61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 007112F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0071134D
                        • Part of subcall function 007112F3: SelectObject.GDI32(?,00000000), ref: 0071135C
                        • Part of subcall function 007112F3: BeginPath.GDI32(?), ref: 00711373
                        • Part of subcall function 007112F3: SelectObject.GDI32(?,00000000), ref: 0071139C
                      • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0079C1C4
                      • LineTo.GDI32(00000000,00000003,?), ref: 0079C1D8
                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0079C1E6
                      • LineTo.GDI32(00000000,00000000,?), ref: 0079C1F6
                      • EndPath.GDI32(00000000), ref: 0079C206
                      • StrokePath.GDI32(00000000), ref: 0079C216
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                      • String ID:
                      • API String ID: 43455801-0
                      • Opcode ID: a21a009aed551263cfff1d8abba1ba3cff3ec006b968c4229e9aa4ef433995fc
                      • Instruction ID: 33d01fa8fd7e3f3a3f1e881af1dc59a2bbe2eb5a525bd54ea2582469e490fae2
                      • Opcode Fuzzy Hash: a21a009aed551263cfff1d8abba1ba3cff3ec006b968c4229e9aa4ef433995fc
                      • Instruction Fuzzy Hash: E1111B7640010DBFDF129F94DC88EEA7FADFB08354F148022FA188A1A1C7759D55DBA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 007303D3
                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 007303DB
                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 007303E6
                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 007303F1
                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 007303F9
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00730401
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Virtual
                      • String ID:
                      • API String ID: 4278518827-0
                      • Opcode ID: deda7b033fe8944eaeb876ad95975770b851a711ebde7db37f3d9864578e7d3d
                      • Instruction ID: 5890e38bc2dbd0452e74f5c14056ea60e6e2d465f725a6d7050ee5949fb618e5
                      • Opcode Fuzzy Hash: deda7b033fe8944eaeb876ad95975770b851a711ebde7db37f3d9864578e7d3d
                      • Instruction Fuzzy Hash: 800148B0901759BDE3008F5A8C85A52FEA8FF19354F00411BE15887941C7B5A864CBE5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0077569B
                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007756B1
                      • GetWindowThreadProcessId.USER32(?,?), ref: 007756C0
                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007756CF
                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007756D9
                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007756E0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                      • String ID:
                      • API String ID: 839392675-0
                      • Opcode ID: 1a3e0484fa2ee4392e5710da272f7a774860900928e402a8b8113bf7736c7d42
                      • Instruction ID: 9bf39594b0673a77b460b68a1e3a56e18e1287f3705c455c79d85c6695be624f
                      • Opcode Fuzzy Hash: 1a3e0484fa2ee4392e5710da272f7a774860900928e402a8b8113bf7736c7d42
                      • Instruction Fuzzy Hash: 73F03032241658BBE7215BA2DC0DEEF7F7CEFC6B11F00416AFA04D1050D7A91A0286B9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • InterlockedExchange.KERNEL32(?,?), ref: 007774E5
                      • EnterCriticalSection.KERNEL32(?,?,00721044,?,?), ref: 007774F6
                      • TerminateThread.KERNEL32(00000000,000001F6,?,00721044,?,?), ref: 00777503
                      • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00721044,?,?), ref: 00777510
                        • Part of subcall function 00776ED7: CloseHandle.KERNEL32(00000000,?,0077751D,?,00721044,?,?), ref: 00776EE1
                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00777523
                      • LeaveCriticalSection.KERNEL32(?,?,00721044,?,?), ref: 0077752A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                      • String ID:
                      • API String ID: 3495660284-0
                      • Opcode ID: f5dcbf2d3aaaf9e0bff6a5dd53d54905efc2829c92b3fe876a6207eaa3ab662f
                      • Instruction ID: 141d6aaa866c42c0bde78e2ce05b8cdd686d436d6e3b01cc9be80b6328e2dca8
                      • Opcode Fuzzy Hash: f5dcbf2d3aaaf9e0bff6a5dd53d54905efc2829c92b3fe876a6207eaa3ab662f
                      • Instruction Fuzzy Hash: 5FF05E3A140A12EBDB111B64FC8CAEF772AFF45302B104533F202D11B4CB796822CBA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00768E7F
                      • UnloadUserProfile.USERENV(?,?), ref: 00768E8B
                      • CloseHandle.KERNEL32(?), ref: 00768E94
                      • CloseHandle.KERNEL32(?), ref: 00768E9C
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00768EA5
                      • HeapFree.KERNEL32(00000000), ref: 00768EAC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                      • String ID:
                      • API String ID: 146765662-0
                      • Opcode ID: 5ac0f14082fec151548bce0a44eb7ff55bbaf377d2cb982e3a82ff8ce1e5e9aa
                      • Instruction ID: 484e4c377f6c10c10de403354b908a20307c9c8fdb0aeb723be3cd7dc87c28e2
                      • Opcode Fuzzy Hash: 5ac0f14082fec151548bce0a44eb7ff55bbaf377d2cb982e3a82ff8ce1e5e9aa
                      • Instruction Fuzzy Hash: 62E0C236044405FBDA011FF1EC0C90ABF69FB89322B608232F219C1170CB3A9822DB98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,007A2C7C,?), ref: 00767C32
                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,007A2C7C,?), ref: 00767C4A
                      • CLSIDFromProgID.OLE32(?,?,00000000,0079FB80,000000FF,?,00000000,00000800,00000000,?,007A2C7C,?), ref: 00767C6F
                      • _memcmp.LIBCMT ref: 00767C90
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: FromProg$FreeTask_memcmp
                      • String ID: ,,z
                      • API String ID: 314563124-1207407898
                      • Opcode ID: 78afc926b74e7c2d1172d65efc698c21713e1dceeef18033abebd00783fee34d
                      • Instruction ID: f4975705671cddc76cde562c4ba16d2e939b0bb9719d9f163748564cac78cefb
                      • Opcode Fuzzy Hash: 78afc926b74e7c2d1172d65efc698c21713e1dceeef18033abebd00783fee34d
                      • Instruction Fuzzy Hash: D1811B71A00109EFCB04DF94C988DEEB7B9FF89355F244198E906EB250DB75AE46CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • VariantInit.OLEAUT32(?), ref: 00788928
                      • CharUpperBuffW.USER32(?,?), ref: 00788A37
                      • VariantClear.OLEAUT32(?), ref: 00788BAF
                        • Part of subcall function 00777804: VariantInit.OLEAUT32(00000000), ref: 00777844
                        • Part of subcall function 00777804: VariantCopy.OLEAUT32(00000000,?), ref: 0077784D
                        • Part of subcall function 00777804: VariantClear.OLEAUT32(00000000), ref: 00777859
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Variant$ClearInit$BuffCharCopyUpper
                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                      • API String ID: 4237274167-1221869570
                      • Opcode ID: e43057047922ecdf1e2216ead4f30e1ae06f7d4f9edea7eaf012b4b9eaaa8038
                      • Instruction ID: 91853764a0d1ba14af72cb1b148f70449c21ddd0119058bc2e8b3ffc0db022c8
                      • Opcode Fuzzy Hash: e43057047922ecdf1e2216ead4f30e1ae06f7d4f9edea7eaf012b4b9eaaa8038
                      • Instruction Fuzzy Hash: CB918271644301DFC714EF28C48495ABBE4EFC8314F04896EF8968B3A1DB35E946CB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 0072FEC6: _wcscpy.LIBCMT ref: 0072FEE9
                      • _memset.LIBCMT ref: 00773077
                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007730A6
                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00773159
                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00773187
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ItemMenu$Info$Default_memset_wcscpy
                      • String ID: 0
                      • API String ID: 4152858687-4108050209
                      • Opcode ID: 620163b1dd8b9822867c1ba4d68afd1ad5b862140502c077f905726bbf2d8e8a
                      • Instruction ID: 85050c70c2f9c03f0978d944bc6fe79957abcd8d6ba12787b28f52139e94c265
                      • Opcode Fuzzy Hash: 620163b1dd8b9822867c1ba4d68afd1ad5b862140502c077f905726bbf2d8e8a
                      • Instruction Fuzzy Hash: 9B51E3716083049EDB259F28C849A6BB7E4EF453A0F44892EF899D3191DB7CCE44E752
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 00772CAF
                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00772CCB
                      • DeleteMenu.USER32(?,00000007,00000000), ref: 00772D11
                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,007D6890,00000000), ref: 00772D5A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Menu$Delete$InfoItem_memset
                      • String ID: 0
                      • API String ID: 1173514356-4108050209
                      • Opcode ID: 43c814c244637472ae4aea5ccd02fc75ed65449225d6c184338ffacf2ee2ccdf
                      • Instruction ID: b1949a037e68cd09f26e95e90d760a71736c1b8c6afcf0b5ab329033e7917e1d
                      • Opcode Fuzzy Hash: 43c814c244637472ae4aea5ccd02fc75ed65449225d6c184338ffacf2ee2ccdf
                      • Instruction Fuzzy Hash: 6F4183302043419FDB24DF24C845B5AB7E4EF85360F14856EF97997292DB78E906CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0078DAD9
                        • Part of subcall function 007179AB: _memmove.LIBCMT ref: 007179F9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: BuffCharLower_memmove
                      • String ID: cdecl$none$stdcall$winapi
                      • API String ID: 3425801089-567219261
                      • Opcode ID: 3c9429fb011bbc3fb473b2cc1a3c6f366831a717da4cfe365d16f8964b6aeb97
                      • Instruction ID: 3b577f1bb7d475382da6508e7ec21dc04468f46d866d896dc8fc88093ca886b5
                      • Opcode Fuzzy Hash: 3c9429fb011bbc3fb473b2cc1a3c6f366831a717da4cfe365d16f8964b6aeb97
                      • Instruction Fuzzy Hash: CA318370600619DFCF14EF58C8959EEB7B5FF05320F108629E865976D1DB39AD45CB80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                        • Part of subcall function 0076B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0076B0E7
                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007693F6
                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00769409
                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00769439
                        • Part of subcall function 00717D2C: _memmove.LIBCMT ref: 00717D66
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$_memmove$ClassName
                      • String ID: ComboBox$ListBox
                      • API String ID: 365058703-1403004172
                      • Opcode ID: 30080ad9174e0965200a051292f75835d06d9854fcb00a5d51f01068b73d7ce9
                      • Instruction ID: 89599c6800e9321d487fa14301fbef4b7d66a026181aeb5cc833b69c35d3dfbc
                      • Opcode Fuzzy Hash: 30080ad9174e0965200a051292f75835d06d9854fcb00a5d51f01068b73d7ce9
                      • Instruction Fuzzy Hash: DD21A5B1A40104FADB18AB64DC89DFFBB7CDF45350B108119F926A72E1DB3D494A9610
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00711D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00711D73
                        • Part of subcall function 00711D35: GetStockObject.GDI32(00000011), ref: 00711D87
                        • Part of subcall function 00711D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00711D91
                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 007966D0
                      • LoadLibraryW.KERNEL32(?), ref: 007966D7
                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 007966EC
                      • DestroyWindow.USER32(?), ref: 007966F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                      • String ID: SysAnimate32
                      • API String ID: 4146253029-1011021900
                      • Opcode ID: f9af0774dd4093afb0b1d4bd046be3a2a9a1d3dbeec622ca1beb31535745621d
                      • Instruction ID: a6e372efceda1d060815f5091f358d88b053d692e2921411d51a0b5b31acfd29
                      • Opcode Fuzzy Hash: f9af0774dd4093afb0b1d4bd046be3a2a9a1d3dbeec622ca1beb31535745621d
                      • Instruction Fuzzy Hash: 3B218BB1200206EBEF104EA4FC81EAB37BDEB59368F10472AF95092190D7798C519760
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetStdHandle.KERNEL32(0000000C), ref: 0077705E
                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00777091
                      • GetStdHandle.KERNEL32(0000000C), ref: 007770A3
                      • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 007770DD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CreateHandle$FilePipe
                      • String ID: nul
                      • API String ID: 4209266947-2873401336
                      • Opcode ID: bf7a568257280128ba04b124e3a3e7484ef0650d943253c55b3b6040d6ab3465
                      • Instruction ID: 9893469017c3d4744171df24bdd4bf3bae6f5aa3fc03941b699bfbe34befdac6
                      • Opcode Fuzzy Hash: bf7a568257280128ba04b124e3a3e7484ef0650d943253c55b3b6040d6ab3465
                      • Instruction Fuzzy Hash: A8218174604309ABDF249F38DC09BAA77A8BF44764F20C61AFCA4D72D0D7759850CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetStdHandle.KERNEL32(000000F6), ref: 0077712B
                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0077715D
                      • GetStdHandle.KERNEL32(000000F6), ref: 0077716E
                      • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 007771A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CreateHandle$FilePipe
                      • String ID: nul
                      • API String ID: 4209266947-2873401336
                      • Opcode ID: 04182d2d81688db326884751182b3d568055062d8fd5d572f19870914929d015
                      • Instruction ID: fd91664e28c38e65d46e7904bc74f6c5498f4cc302ebc1061f962ed35597e18d
                      • Opcode Fuzzy Hash: 04182d2d81688db326884751182b3d568055062d8fd5d572f19870914929d015
                      • Instruction Fuzzy Hash: DF21D371504309ABDF249F289C04AAAB7E8BF853B0F60861AFCA4D32D0D7749841CB64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0077AEBF
                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0077AF13
                      • __swprintf.LIBCMT ref: 0077AF2C
                      • SetErrorMode.KERNEL32(00000000,00000001,00000000,0079F910), ref: 0077AF6A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ErrorMode$InformationVolume__swprintf
                      • String ID: %lu
                      • API String ID: 3164766367-685833217
                      • Opcode ID: fa73aeee4c48074d86c676799fef1dca95f85605447e41c0d7286ad7508623ac
                      • Instruction ID: b0db991dc9970f553102bc54ba76136d03ebd01f16a29d6039b0c8d084abcb19
                      • Opcode Fuzzy Hash: fa73aeee4c48074d86c676799fef1dca95f85605447e41c0d7286ad7508623ac
                      • Instruction Fuzzy Hash: EE214471600109EFDB10EF54C989DEE7BB8EF89704B108069F909DB251DB35EA41CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00717D2C: _memmove.LIBCMT ref: 00717D66
                        • Part of subcall function 0076A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0076A399
                        • Part of subcall function 0076A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0076A3AC
                        • Part of subcall function 0076A37C: GetCurrentThreadId.KERNEL32 ref: 0076A3B3
                        • Part of subcall function 0076A37C: AttachThreadInput.USER32(00000000), ref: 0076A3BA
                      • GetFocus.USER32 ref: 0076A554
                        • Part of subcall function 0076A3C5: GetParent.USER32(?), ref: 0076A3D3
                      • GetClassNameW.USER32(?,?,00000100), ref: 0076A59D
                      • EnumChildWindows.USER32(?,0076A615), ref: 0076A5C5
                      • __swprintf.LIBCMT ref: 0076A5DF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                      • String ID: %s%d
                      • API String ID: 1941087503-1110647743
                      • Opcode ID: b147ccdfae94fef33d136bac1d9860c7e9ec2e039e435d7501d1c06b43dff246
                      • Instruction ID: 3d805e429b4aede486b949cdb25556197abf7d8896b8c0366568171f273de166
                      • Opcode Fuzzy Hash: b147ccdfae94fef33d136bac1d9860c7e9ec2e039e435d7501d1c06b43dff246
                      • Instruction Fuzzy Hash: 2111A271200208BBDF11BFA4EC89FEA7778AF49700F044075FD09AA192CA7859458F75
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CharUpperBuffW.USER32(?,?), ref: 00772048
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: BuffCharUpper
                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                      • API String ID: 3964851224-769500911
                      • Opcode ID: d4d9a4b336ef542d64c2e2b84f36e0b570a6631b66ba094ab789f08ae0f1d73b
                      • Instruction ID: 254ca9fe4854bf391c07df784380ebe47cdd3d923291f316e0318e5c24f516e5
                      • Opcode Fuzzy Hash: d4d9a4b336ef542d64c2e2b84f36e0b570a6631b66ba094ab789f08ae0f1d73b
                      • Instruction Fuzzy Hash: B411273491010DDF8F00EFA4D8519FEB7B4BF15308F20846DD8A5A7292EB3A6907CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0078EF1B
                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0078EF4B
                      • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0078F07E
                      • CloseHandle.KERNEL32(?), ref: 0078F0FF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Process$CloseCountersHandleInfoMemoryOpen
                      • String ID:
                      • API String ID: 2364364464-0
                      • Opcode ID: b80707e821a95bbfc1858e31615a5acdba4197e0b007a085a93cbdd4e5651c65
                      • Instruction ID: a342623f6264f3be84339d0e10909d3b57046ae7ef261893a3a49b812b3831ec
                      • Opcode Fuzzy Hash: b80707e821a95bbfc1858e31615a5acdba4197e0b007a085a93cbdd4e5651c65
                      • Instruction Fuzzy Hash: 4C816371644300DFD720EF28C85AB6AB7E5AF48B10F14881DF695DB2D2D778AC45CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                        • Part of subcall function 007910A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00790038,?,?), ref: 007910BC
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00790388
                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007903C7
                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0079040E
                      • RegCloseKey.ADVAPI32(?,?), ref: 0079043A
                      • RegCloseKey.ADVAPI32(00000000), ref: 00790447
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                      • String ID:
                      • API String ID: 3440857362-0
                      • Opcode ID: dc72b194db8ba916a7de0c9333f7376deb80a326e822f9489e07d614244fbad1
                      • Instruction ID: bc9150ca6a77989fa915c74a78e217cee98ec941b63badda2ec0bd268f421e59
                      • Opcode Fuzzy Hash: dc72b194db8ba916a7de0c9333f7376deb80a326e822f9489e07d614244fbad1
                      • Instruction Fuzzy Hash: D7516E31218204EFDB04EF58D885EAEB7E8FF84314F44851DF595871A1DB38E945CB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0077E88A
                      • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0077E8B3
                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0077E8F2
                        • Part of subcall function 00719997: __itow.LIBCMT ref: 007199C2
                        • Part of subcall function 00719997: __swprintf.LIBCMT ref: 00719A0C
                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0077E917
                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0077E91F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                      • String ID:
                      • API String ID: 1389676194-0
                      • Opcode ID: 68e41034ff37faeebf9d872d727ade1b0f5f4a018e90fc2c2ba5ec16070c10a7
                      • Instruction ID: 8ab4e98bce59ee525f0618d6a42c0c084b30977d98e1700f3e3a80d2315ea24f
                      • Opcode Fuzzy Hash: 68e41034ff37faeebf9d872d727ade1b0f5f4a018e90fc2c2ba5ec16070c10a7
                      • Instruction Fuzzy Hash: 0A513A35A00205DFCF00EF68C995AAEBBF5EF48310B148099E949AB3A2CB35ED51CB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 67ce67fc4aba851bf74af4d35b704aad597112f7e4745d550601e6d6d8165994
                      • Instruction ID: 63d05d5595e071f047995e4e550d77b41c6328b2938c29f298350343cce7c680
                      • Opcode Fuzzy Hash: 67ce67fc4aba851bf74af4d35b704aad597112f7e4745d550601e6d6d8165994
                      • Instruction Fuzzy Hash: 9841E135902204BFDF20DF28EC48FA9BBA8EB09310F154166F856E72E1D778AD51DAD1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetCursorPos.USER32(?), ref: 00712357
                      • ScreenToClient.USER32(007D67B0,?), ref: 00712374
                      • GetAsyncKeyState.USER32(00000001), ref: 00712399
                      • GetAsyncKeyState.USER32(00000002), ref: 007123A7
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AsyncState$ClientCursorScreen
                      • String ID:
                      • API String ID: 4210589936-0
                      • Opcode ID: 4fe6a8c7b5ec004851c18b69efe6846a55e08e224cecdf77b2b37df85252228d
                      • Instruction ID: d393adedded2271174ba98998666e4b5d024f68ecfe90ab5734074625c7f9f77
                      • Opcode Fuzzy Hash: 4fe6a8c7b5ec004851c18b69efe6846a55e08e224cecdf77b2b37df85252228d
                      • Instruction Fuzzy Hash: FF418371504119FFDF169F68C848AEDBB74FB05360F20431AF934922D1C7789AA1DBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0076695D
                      • TranslateAcceleratorW.USER32(?,?,?), ref: 007669A9
                      • TranslateMessage.USER32(?), ref: 007669D2
                      • DispatchMessageW.USER32(?), ref: 007669DC
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007669EB
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Message$PeekTranslate$AcceleratorDispatch
                      • String ID:
                      • API String ID: 2108273632-0
                      • Opcode ID: bc29451c3046e8b58be3a52aaac24d26877470738c18b300ce069e56fac64e81
                      • Instruction ID: 9d1d30309a78fc7b862550ead560f7071e73608ba575f23ed73e31a765851cc0
                      • Opcode Fuzzy Hash: bc29451c3046e8b58be3a52aaac24d26877470738c18b300ce069e56fac64e81
                      • Instruction Fuzzy Hash: 7831A371901346AADB20CFB4DC44BB67BBCAB01314F54816AEC23D21A1D73DA889DBA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetWindowRect.USER32(?,?), ref: 00768F12
                      • PostMessageW.USER32(?,00000201,00000001), ref: 00768FBC
                      • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00768FC4
                      • PostMessageW.USER32(?,00000202,00000000), ref: 00768FD2
                      • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00768FDA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessagePostSleep$RectWindow
                      • String ID:
                      • API String ID: 3382505437-0
                      • Opcode ID: 54112b9ee0e27a38653a259e82b7bd6905393189f39fd0374eb36c360c5e7e81
                      • Instruction ID: a4101fed6f86108772505c85cf971770603c7db89c1028e0ed8662c69d56f81d
                      • Opcode Fuzzy Hash: 54112b9ee0e27a38653a259e82b7bd6905393189f39fd0374eb36c360c5e7e81
                      • Instruction Fuzzy Hash: 8831DF71500219EFDF10CF68D94CADE7BB6EB04315F108229FD26EA2D0C7B89954CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • IsWindowVisible.USER32(?), ref: 0076B6C7
                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0076B6E4
                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0076B71C
                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0076B742
                      • _wcsstr.LIBCMT ref: 0076B74C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                      • String ID:
                      • API String ID: 3902887630-0
                      • Opcode ID: f9f721fcbad95c0d5553cacf4898b26482d683f631698cc98670a7480eb328f6
                      • Instruction ID: 3b15ce844eb73397b191f976d4488399cbe596965ff78d78b00cc5b7e9930168
                      • Opcode Fuzzy Hash: f9f721fcbad95c0d5553cacf4898b26482d683f631698cc98670a7480eb328f6
                      • Instruction Fuzzy Hash: 4421FC31204204FBEB255B35DC49E7B7B9CDF4A710F00803AFD06DA162EF69DC819690
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00712612: GetWindowLongW.USER32(?,000000EB), ref: 00712623
                      • GetWindowLongW.USER32(?,000000F0), ref: 0079B44C
                      • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0079B471
                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0079B489
                      • GetSystemMetrics.USER32(00000004), ref: 0079B4B2
                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00781184,00000000), ref: 0079B4D0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$Long$MetricsSystem
                      • String ID:
                      • API String ID: 2294984445-0
                      • Opcode ID: 6db8727e1898a55f1da8fff38268bf76533242e32c0e5ad46ed7c965692ba650
                      • Instruction ID: 6b88319ebeab3023959643c783ebde06564fb5e214a5b6e38bd457f839957527
                      • Opcode Fuzzy Hash: 6db8727e1898a55f1da8fff38268bf76533242e32c0e5ad46ed7c965692ba650
                      • Instruction Fuzzy Hash: EA217171614295AFCF109F38BD44A6A3BA4EB05720F158739F926D61F1E7389821EB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00769802
                        • Part of subcall function 00717D2C: _memmove.LIBCMT ref: 00717D66
                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00769834
                      • __itow.LIBCMT ref: 0076984C
                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00769874
                      • __itow.LIBCMT ref: 00769885
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$__itow$_memmove
                      • String ID:
                      • API String ID: 2983881199-0
                      • Opcode ID: 6b03b514a1fcf3a1df81160f2ecceaead19966fa915bbf27ebcbe5141442f95c
                      • Instruction ID: 29bff5ab1f9fe9a148db231e771a7b74e16f39c52e879b9e742546a6d1e6ed46
                      • Opcode Fuzzy Hash: 6b03b514a1fcf3a1df81160f2ecceaead19966fa915bbf27ebcbe5141442f95c
                      • Instruction Fuzzy Hash: EC21C871700209EBDB109A659C8AEEE7BBCDF49710F044029FE05DB291D6788D45D791
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0071134D
                      • SelectObject.GDI32(?,00000000), ref: 0071135C
                      • BeginPath.GDI32(?), ref: 00711373
                      • SelectObject.GDI32(?,00000000), ref: 0071139C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ObjectSelect$BeginCreatePath
                      • String ID:
                      • API String ID: 3225163088-0
                      • Opcode ID: 5cf8c90bb39698267ee3e864ad1f330966844f046372f9f8034fbe38607ebcbf
                      • Instruction ID: 46c79126e7baa100a5d096bfce6462374c7a1b62ce5ee1850e625336ec0479fa
                      • Opcode Fuzzy Hash: 5cf8c90bb39698267ee3e864ad1f330966844f046372f9f8034fbe38607ebcbf
                      • Instruction Fuzzy Hash: 65216D70801208EFDB109F69EC057A97BB8FB00721F54C227F9609A5E4D37D98D2EB98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memcmp
                      • String ID:
                      • API String ID: 2931989736-0
                      • Opcode ID: 69ca7ede986898eb5dd8c3d8df1dc0b10d849c2e00f83c1d85128c9919314447
                      • Instruction ID: 96c714b8f3f8b862f7376b9231b1bb7609cd65677c0ff40cc52ecaf57fe1b46e
                      • Opcode Fuzzy Hash: 69ca7ede986898eb5dd8c3d8df1dc0b10d849c2e00f83c1d85128c9919314447
                      • Instruction Fuzzy Hash: 7D01B5F260510EBBE209A6245D46FBB735C9B633A4F444121FD4796283EA5CEE12C2E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 00774D5C
                      • __beginthreadex.LIBCMT ref: 00774D7A
                      • MessageBoxW.USER32(?,?,?,?), ref: 00774D8F
                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00774DA5
                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00774DAC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                      • String ID:
                      • API String ID: 3824534824-0
                      • Opcode ID: 8a66703a3b21eff95d8df3741c1f84465a178c7be9331ccbd3d25657d000fde9
                      • Instruction ID: 76cb501daba8a23777631a9dd973fd6f274016be164e6799c4af52e0301e78c8
                      • Opcode Fuzzy Hash: 8a66703a3b21eff95d8df3741c1f84465a178c7be9331ccbd3d25657d000fde9
                      • Instruction Fuzzy Hash: FC110CB2A04248BFCB119BACDC04A9A7FACFB45360F14C266F958D3251D77D9D4087A0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00768766
                      • GetLastError.KERNEL32(?,0076822A,?,?,?), ref: 00768770
                      • GetProcessHeap.KERNEL32(00000008,?,?,0076822A,?,?,?), ref: 0076877F
                      • HeapAlloc.KERNEL32(00000000,?,0076822A,?,?,?), ref: 00768786
                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0076879D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                      • String ID:
                      • API String ID: 842720411-0
                      • Opcode ID: 4a2b995130f7784f5bb759791174834538779ef89beee4d92f237ba97dc99b2b
                      • Instruction ID: ca9e8d5b5d3ea4e6363396a4fd8670a87434a400756556606ceb0cf8d5981de9
                      • Opcode Fuzzy Hash: 4a2b995130f7784f5bb759791174834538779ef89beee4d92f237ba97dc99b2b
                      • Instruction Fuzzy Hash: 34016D71200208FFDB204FA6DC88D6B7BACFF89355720453AFC4AD6260DA358C01CA60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00775502
                      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00775510
                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00775518
                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00775522
                      • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0077555E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: PerformanceQuery$CounterSleep$Frequency
                      • String ID:
                      • API String ID: 2833360925-0
                      • Opcode ID: 509081fac646efc27f4db3dcc73dbddf6b30c2b4c4700cdc61ff7e1720ada192
                      • Instruction ID: ad0f3a11b2743de16fe288dbc20651305519f338a9f4cac28ff3f3955ec989b1
                      • Opcode Fuzzy Hash: 509081fac646efc27f4db3dcc73dbddf6b30c2b4c4700cdc61ff7e1720ada192
                      • Instruction Fuzzy Hash: 14015B31D00A1DDBCF00DFE8E848AEDBB7AFB09711F008556E905F2240DB789960C7A5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0076758C,80070057,?,?,?,0076799D), ref: 0076766F
                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0076758C,80070057,?,?), ref: 0076768A
                      • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0076758C,80070057,?,?), ref: 00767698
                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0076758C,80070057,?), ref: 007676A8
                      • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0076758C,80070057,?,?), ref: 007676B4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: From$Prog$FreeStringTasklstrcmpi
                      • String ID:
                      • API String ID: 3897988419-0
                      • Opcode ID: 36fd60de7cfe60940604e8e28c6704bd3b013677f42dce62f3608a9611babd2b
                      • Instruction ID: f1a44da4e8c2efea24a0d46d2fd54d668fbdb24e4c6cb717e8012ab8d5f66bc8
                      • Opcode Fuzzy Hash: 36fd60de7cfe60940604e8e28c6704bd3b013677f42dce62f3608a9611babd2b
                      • Instruction Fuzzy Hash: 0401D472600604BBDB104F18DC08FAA7BACEB44BA5F104129FD06D3211E779DD51D7A0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00768608
                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00768612
                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00768621
                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00768628
                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0076863E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: HeapInformationToken$AllocErrorLastProcess
                      • String ID:
                      • API String ID: 44706859-0
                      • Opcode ID: 564e01aa8b4d1817cc4b862eb517e7c6fe0bc21934cc5e08746c0b31f6144eeb
                      • Instruction ID: b8343666b3d9a45fec41aff9db1555ea38cdb694c1273abc3fd27d414c1eff1c
                      • Opcode Fuzzy Hash: 564e01aa8b4d1817cc4b862eb517e7c6fe0bc21934cc5e08746c0b31f6144eeb
                      • Instruction Fuzzy Hash: C3F0C230240204BFEB100FA4DC8DE6F3BACEF89754B048226F906C2161CB789C46DA65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00768669
                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00768673
                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00768682
                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00768689
                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0076869F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: HeapInformationToken$AllocErrorLastProcess
                      • String ID:
                      • API String ID: 44706859-0
                      • Opcode ID: 5f3b1d4c6198845e1f4b4221eba3160f7c96e11f495a5ce51b3a0be94563d37f
                      • Instruction ID: 798303c595bc1d6813879b86cd25272f9dbb7ebeface6eedf2ba072b08dc5af2
                      • Opcode Fuzzy Hash: 5f3b1d4c6198845e1f4b4221eba3160f7c96e11f495a5ce51b3a0be94563d37f
                      • Instruction Fuzzy Hash: 1BF0C270240304BFEB111FA4EC88E6B3BACEF89758B100126F906C6151CB79DC02DA65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetDlgItem.USER32(?,000003E9), ref: 0076C6BA
                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 0076C6D1
                      • MessageBeep.USER32(00000000), ref: 0076C6E9
                      • KillTimer.USER32(?,0000040A), ref: 0076C705
                      • EndDialog.USER32(?,00000001), ref: 0076C71F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                      • String ID:
                      • API String ID: 3741023627-0
                      • Opcode ID: 4d8136897f05f5b62d7bcec25a5723c479f4b99c78938cbdc366ebeb268638af
                      • Instruction ID: 90eac7e2a1c4cd2ccd13e7c246680b6112ba4d58df93c5446242d036b60624b1
                      • Opcode Fuzzy Hash: 4d8136897f05f5b62d7bcec25a5723c479f4b99c78938cbdc366ebeb268638af
                      • Instruction Fuzzy Hash: B7016270500704ABEB219B64ED4EFA677B8FF00705F04466AF993E14E1DBE8A9558F84
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • EndPath.GDI32(?), ref: 007113BF
                      • StrokeAndFillPath.GDI32(?,?,0074BAD8,00000000,?), ref: 007113DB
                      • SelectObject.GDI32(?,00000000), ref: 007113EE
                      • DeleteObject.GDI32 ref: 00711401
                      • StrokePath.GDI32(?), ref: 0071141C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Path$ObjectStroke$DeleteFillSelect
                      • String ID:
                      • API String ID: 2625713937-0
                      • Opcode ID: 36d5b7c022a34a35e7d454c3f3ece97d18c3c7f67a74eb2d532d7279cf555ce4
                      • Instruction ID: 2107f574488a8764d6cb9c012d99f38ba9b596b51632a1572bc591db834a9beb
                      • Opcode Fuzzy Hash: 36d5b7c022a34a35e7d454c3f3ece97d18c3c7f67a74eb2d532d7279cf555ce4
                      • Instruction Fuzzy Hash: 2AF0EC30005348EBDB115F6AEC0C7983FB8A701726F54C226E969890F1D73D99A6EF58
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00730FF6: std::exception::exception.LIBCMT ref: 0073102C
                        • Part of subcall function 00730FF6: __CxxThrowException@8.LIBCMT ref: 00731041
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                        • Part of subcall function 00717BB1: _memmove.LIBCMT ref: 00717C0B
                      • __swprintf.LIBCMT ref: 0072302D
                      Strings
                      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00722EC6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                      • API String ID: 1943609520-557222456
                      • Opcode ID: 4b53a9b7403d856bbc97a391a44765b34ac45865d47a77c7636a9380ac10d2c4
                      • Instruction ID: 0d0cb6097e4a23c9db23240046b863d741ae75546cdf99427afbc4b3f8267b63
                      • Opcode Fuzzy Hash: 4b53a9b7403d856bbc97a391a44765b34ac45865d47a77c7636a9380ac10d2c4
                      • Instruction Fuzzy Hash: 46918E71508211DFD728EF28D889CAEB7B5EF85700F40491DF841972A1DB78EE49CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • OleSetContainedObject.OLE32(?,00000001), ref: 0076B981
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ContainedObject
                      • String ID: AutoIt3GUI$Container$%z
                      • API String ID: 3565006973-1118916724
                      • Opcode ID: cf4b3784589f73f3224b30581d16503fd0706b1f37abce084cdda166a1f9873a
                      • Instruction ID: 4c49ed286314f1e270c117bf98367702c98f56b9b956318a158e5660f5c59686
                      • Opcode Fuzzy Hash: cf4b3784589f73f3224b30581d16503fd0706b1f37abce084cdda166a1f9873a
                      • Instruction Fuzzy Hash: 3F914A70600202DFDB64DF68C884B6AB7E8FF49710F14856DF94ADB691DB74E881CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __startOneArgErrorHandling.LIBCMT ref: 007352DD
                        • Part of subcall function 00740340: __87except.LIBCMT ref: 0074037B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ErrorHandling__87except__start
                      • String ID: pow
                      • API String ID: 2905807303-2276729525
                      • Opcode ID: 56f9f074e0871da702e3532b7b2cd97e5da9b6e43798fca4a2d8dc11272ae4f0
                      • Instruction ID: 73d0ebdd2314e7f4c0d6f28e038cb886e931acc7f264157ac486b0607a4c8175
                      • Opcode Fuzzy Hash: 56f9f074e0871da702e3532b7b2cd97e5da9b6e43798fca4a2d8dc11272ae4f0
                      • Instruction Fuzzy Hash: 70518871A0DA01C7EB14BB28CD4137E2B94AB41750F248D58E6D5822EBEF7C8CD4DAC6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID: #$+
                      • API String ID: 0-2552117581
                      • Opcode ID: 6c972b9b659dd5e6ea43f3acc762ed2a92a94da9c1cd80f588b71762ae24c68a
                      • Instruction ID: ce63ccd14ced518e3e8724c7127f390ca71bf0f4e3c3657bcdc4bd3fa4463b47
                      • Opcode Fuzzy Hash: 6c972b9b659dd5e6ea43f3acc762ed2a92a94da9c1cd80f588b71762ae24c68a
                      • Instruction Fuzzy Hash: 98512175204646DFDF259F28C898AFA7BB4EF15310F184059EC929B2E1D73C9C86DBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memmove$_free
                      • String ID: Oar
                      • API String ID: 2620147621-1181374745
                      • Opcode ID: f0a74a1c25cb78344b42fc74c7a34c6531645f646c86e05897e74167d697d1ba
                      • Instruction ID: c4be6d512b23498d4983619fd861736f4e136aeb4e836596d619c686029424c5
                      • Opcode Fuzzy Hash: f0a74a1c25cb78344b42fc74c7a34c6531645f646c86e05897e74167d697d1ba
                      • Instruction Fuzzy Hash: EA516AB16083519FDB28CF28D450B6BBBE5FF89310F04492DE98987351EB39E941CB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memset$_memmove
                      • String ID: ERCP
                      • API String ID: 2532777613-1384759551
                      • Opcode ID: 9e8d86fc2a94077376458ebd8b4eb2056eb8975375419b69359ae043d3b4e955
                      • Instruction ID: ddebae64d999f8c4d74d00006bcf852bf694c5289f443de6224c8b6ace176201
                      • Opcode Fuzzy Hash: 9e8d86fc2a94077376458ebd8b4eb2056eb8975375419b69359ae043d3b4e955
                      • Instruction Fuzzy Hash: C551E471900759DFDB28DF65D885BAABBF4EF04314F20856FE98AC7241E7789684CB80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 007976D0
                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 007976E4
                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00797708
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$Window
                      • String ID: SysMonthCal32
                      • API String ID: 2326795674-1439706946
                      • Opcode ID: 7d9a6c00c583a4f02fd4109f66aaddb8ef291f3e7322ef55f6c261b74d71df23
                      • Instruction ID: 660ac0d8397521c6a3ffd276487b55c35498514ea5add730eaa2a31abe5a4db1
                      • Opcode Fuzzy Hash: 7d9a6c00c583a4f02fd4109f66aaddb8ef291f3e7322ef55f6c261b74d71df23
                      • Instruction Fuzzy Hash: 3721E032610218BBDF15CFA4DC46FEA3B79EF48724F110214FE15AB1D0DAB9A851CBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00796FAA
                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00796FBA
                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00796FDF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend$MoveWindow
                      • String ID: Listbox
                      • API String ID: 3315199576-2633736733
                      • Opcode ID: d8e204f0b7e935c09ae05eda0e5650828737db58859977cbbb0f598ceb06bd50
                      • Instruction ID: 56d5ca8ae870c222e469fea61572c14266729deae9ed3a0237237990c86c34f3
                      • Opcode Fuzzy Hash: d8e204f0b7e935c09ae05eda0e5650828737db58859977cbbb0f598ceb06bd50
                      • Instruction Fuzzy Hash: EA219532610118BFDF118F54EC85FAB376AEF89754F018225F9149B190C6799C5187A0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 007979E1
                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 007979F6
                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00797A03
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: msctls_trackbar32
                      • API String ID: 3850602802-1010561917
                      • Opcode ID: fedff69fec7be0521c229b8f9ac4a65010c7bfbaeebfdbc0befae969a31cc403
                      • Instruction ID: 9d50b5f2c9dc27f3db3700857684d3a5bf4ab7138de3730277436041468f0e32
                      • Opcode Fuzzy Hash: fedff69fec7be0521c229b8f9ac4a65010c7bfbaeebfdbc0befae969a31cc403
                      • Instruction Fuzzy Hash: 2811E372254208BFEF149F74DC05FEB3BA9EF89764F014519FA41A6090D275A851CB64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00714C2E), ref: 00714CA3
                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00714CB5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: GetNativeSystemInfo$kernel32.dll
                      • API String ID: 2574300362-192647395
                      • Opcode ID: 8ca9188ca928e518c7de3a79344d10ec669ff49b5a6457acb82689febe2eefbd
                      • Instruction ID: 4100326d3b11f9a98225545875edf5184b89e98a691786fd6bd27239d9c238b4
                      • Opcode Fuzzy Hash: 8ca9188ca928e518c7de3a79344d10ec669ff49b5a6457acb82689febe2eefbd
                      • Instruction Fuzzy Hash: C7D05BB0551727CFDB209F35ED1864676E5AF05791B15C83ED885D6190D77CD4C0CAA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00714D2E,?,00714F4F,?,007D62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00714D6F
                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00714D81
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                      • API String ID: 2574300362-3689287502
                      • Opcode ID: 4e8420c8350549c70ed29500b4e90caf39415fc146a21bab09e9b20ff30b727d
                      • Instruction ID: a81a3bfc20d251b41808c97f353a2fb5fa6cf8446c51c368070ff1d788ae21dc
                      • Opcode Fuzzy Hash: 4e8420c8350549c70ed29500b4e90caf39415fc146a21bab09e9b20ff30b727d
                      • Instruction Fuzzy Hash: 5AD017B0650713CFDB209F35E80965676E9AF15352B21C83ED4C6D62A0EA78D8C0CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00714CE1,?), ref: 00714DA2
                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00714DB4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                      • API String ID: 2574300362-1355242751
                      • Opcode ID: d49d2c103b6664193e92bcd88fc5b0138fea9a2469480df271405becf96358ad
                      • Instruction ID: a1f527de6cd30369b6854d93fee990e627b8e20f6676c5bf61942ce9efc86f82
                      • Opcode Fuzzy Hash: d49d2c103b6664193e92bcd88fc5b0138fea9a2469480df271405becf96358ad
                      • Instruction Fuzzy Hash: A4D017B1690713DFDB209F35E808A8676E5AF06355B11C83ED8C6D61A0EB78D8C1CA91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryA.KERNEL32(advapi32.dll,?,007912C1), ref: 00791080
                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00791092
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: RegDeleteKeyExW$advapi32.dll
                      • API String ID: 2574300362-4033151799
                      • Opcode ID: 15ff7eb7a1e85cd50a681958eeddefb65e936460ad9924beb24af0230a54d1f7
                      • Instruction ID: dc805f33ba9cbb8ba88d3676bd7d2dbf62c64fd2555b6db41773059d962ae3cf
                      • Opcode Fuzzy Hash: 15ff7eb7a1e85cd50a681958eeddefb65e936460ad9924beb24af0230a54d1f7
                      • Instruction Fuzzy Hash: 08D01770550713CFDB209F39E819A1A76E8EF05362F11CC3EE48ADA160E778C8C0CA90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00789009,?,0079F910), ref: 00789403
                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00789415
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: GetModuleHandleExW$kernel32.dll
                      • API String ID: 2574300362-199464113
                      • Opcode ID: ba43ea8bb0a400ff06563b1daf028d318f6b35e2061d0ea8d7ca173cbebb2455
                      • Instruction ID: ea4601f4231d18739dbebb58d8f7f40ded0d6a5dae4ffcd432b304ebd38b320e
                      • Opcode Fuzzy Hash: ba43ea8bb0a400ff06563b1daf028d318f6b35e2061d0ea8d7ca173cbebb2455
                      • Instruction Fuzzy Hash: BAD0C270580717CFCB209F30D90861372D5AF01341B24C83FD489C2550D678C480C750
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 695c4b70426d61e66048f16424f0c0ed961a7285df0b1047f492951c3284d16a
                      • Instruction ID: 86cefe0e2098ff7dd55ccf0a17f6e89f7a4daf272e010d0b96d9f639efe07407
                      • Opcode Fuzzy Hash: 695c4b70426d61e66048f16424f0c0ed961a7285df0b1047f492951c3284d16a
                      • Instruction Fuzzy Hash: 79C18274A04216EFCB18CFA8C884E6EB7F5FF48758B118599E806EB251D734ED81DB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CharLowerBuffW.USER32(?,?), ref: 0078E3D2
                      • CharLowerBuffW.USER32(?,?), ref: 0078E415
                        • Part of subcall function 0078DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0078DAD9
                      • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0078E615
                      • _memmove.LIBCMT ref: 0078E628
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: BuffCharLower$AllocVirtual_memmove
                      • String ID:
                      • API String ID: 3659485706-0
                      • Opcode ID: d7d1a45413cd1a5affee3f49d42fb049ef696f128de98d4e07b0a4e10163152c
                      • Instruction ID: c29782d38888448014f274924ae82136d8d9b660028913436f8ed407dd4b08ef
                      • Opcode Fuzzy Hash: d7d1a45413cd1a5affee3f49d42fb049ef696f128de98d4e07b0a4e10163152c
                      • Instruction Fuzzy Hash: 8CC15971608301CFC714EF28C49496ABBE4FF88718F14896EF8999B351D739E946CB82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CoInitialize.OLE32(00000000), ref: 007883D8
                      • CoUninitialize.OLE32 ref: 007883E3
                        • Part of subcall function 0076DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0076DAC5
                      • VariantInit.OLEAUT32(?), ref: 007883EE
                      • VariantClear.OLEAUT32(?), ref: 007886BF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                      • String ID:
                      • API String ID: 780911581-0
                      • Opcode ID: 1fe17ccd6ee1c295a640d575e4e4d410bf7f9e3ab2648e478b3876b4073b907b
                      • Instruction ID: 5172e245cbe6fbe20f5573aef28460d3a3460ebab76bcde6ecf7f3a8fb4ab0f6
                      • Opcode Fuzzy Hash: 1fe17ccd6ee1c295a640d575e4e4d410bf7f9e3ab2648e478b3876b4073b907b
                      • Instruction Fuzzy Hash: BEA15A35244701DFCB50EF18C895A5AB7E4BF88314F448449FA9A9B3A2DB38FD45CB82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Variant$AllocClearCopyInitString
                      • String ID:
                      • API String ID: 2808897238-0
                      • Opcode ID: ee57b700b834e689ab81eaa02976233ad4b6cf1f9807a0f4d332d62e58047d26
                      • Instruction ID: a0b4089d7973f861e68d201a78281ceacaa98dc51294f95ab63760e05d1e9d02
                      • Opcode Fuzzy Hash: ee57b700b834e689ab81eaa02976233ad4b6cf1f9807a0f4d332d62e58047d26
                      • Instruction Fuzzy Hash: D751A930604301DADB249F69D495A6AB3E5AF48354F70881FED97CB291EB7C9880DB15
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetWindowRect.USER32(011EFB10,?), ref: 00799AD2
                      • ScreenToClient.USER32(00000002,00000002), ref: 00799B05
                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00799B72
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$ClientMoveRectScreen
                      • String ID:
                      • API String ID: 3880355969-0
                      • Opcode ID: 112712d5b8098a0631e5b364de313288b2e4a6813bea071afdf6f87ea31b48e1
                      • Instruction ID: ae1d3e7c8482526ee8caeccf07085c12abe6cfb62efd757154ae690c15f78f25
                      • Opcode Fuzzy Hash: 112712d5b8098a0631e5b364de313288b2e4a6813bea071afdf6f87ea31b48e1
                      • Instruction Fuzzy Hash: FD515F74A00209EFDF10DF68E8819AE7BB6FF55320F10816EF9159B290D738AD81CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00786CE4
                      • WSAGetLastError.WSOCK32(00000000), ref: 00786CF4
                        • Part of subcall function 00719997: __itow.LIBCMT ref: 007199C2
                        • Part of subcall function 00719997: __swprintf.LIBCMT ref: 00719A0C
                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00786D58
                      • WSAGetLastError.WSOCK32(00000000), ref: 00786D64
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ErrorLast$__itow__swprintfsocket
                      • String ID:
                      • API String ID: 2214342067-0
                      • Opcode ID: 7f0445a8d20298d41dcfb6c4d5fb91979b131128da87299e62077931f27c7ee8
                      • Instruction ID: 65bf7e4443de5196cf80ab3eb021c010676ccc7e69e5e1e54fe6fc0f63cc971c
                      • Opcode Fuzzy Hash: 7f0445a8d20298d41dcfb6c4d5fb91979b131128da87299e62077931f27c7ee8
                      • Instruction Fuzzy Hash: 8A41A274740200AFEB20BF28DC9AFBA77E5AF44B10F44C018FA599F2D2DA789D418791
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0079F910), ref: 007867BA
                      • _strlen.LIBCMT ref: 007867EC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _strlen
                      • String ID:
                      • API String ID: 4218353326-0
                      • Opcode ID: cf0b09b5ae01c514c0d7dd55305010c1ca5fd7ef207bb08a52818a4f9d98fac0
                      • Instruction ID: 1dff7171683a90fc3b3d24c47ebeed0aa2833932d17812a6ddc15377d76f1584
                      • Opcode Fuzzy Hash: cf0b09b5ae01c514c0d7dd55305010c1ca5fd7ef207bb08a52818a4f9d98fac0
                      • Instruction Fuzzy Hash: 5B41B571A40104EFCB14FB68DCD9EEEB7A9AF44314F148165F91A9B2D2DB38AD41C790
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0077BB09
                      • GetLastError.KERNEL32(?,00000000), ref: 0077BB2F
                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0077BB54
                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0077BB80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CreateHardLink$DeleteErrorFileLast
                      • String ID:
                      • API String ID: 3321077145-0
                      • Opcode ID: bcae5913473f5ee5900816a8a43474b9b8eeac1ebb291e66bdc3e67a34bc31f8
                      • Instruction ID: 0bcd9821239cb676acdd218ce6d9439e336764b65a0738c9491347ea98e692bf
                      • Opcode Fuzzy Hash: bcae5913473f5ee5900816a8a43474b9b8eeac1ebb291e66bdc3e67a34bc31f8
                      • Instruction Fuzzy Hash: 39412B35200510DFCF11EF18C598A5DBBE5AF89310B09C498ED4A9B3A2CB38FD42CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00798B4D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: InvalidateRect
                      • String ID:
                      • API String ID: 634782764-0
                      • Opcode ID: 80f2428f188875273b3d5f4cab876cc6a44fab6d7c8645da44c33c570a546056
                      • Instruction ID: ff6cf4ed3bf6b0cfbb74912fc8bb6cef16d707af957dbf4af01585e61d295495
                      • Opcode Fuzzy Hash: 80f2428f188875273b3d5f4cab876cc6a44fab6d7c8645da44c33c570a546056
                      • Instruction Fuzzy Hash: 1231D2F4600204BFEFA09B18EC85FA937A4EB07310F288617FA55D72A1CE3CA9509756
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ClientToScreen.USER32(?,?), ref: 0079AE1A
                      • GetWindowRect.USER32(?,?), ref: 0079AE90
                      • PtInRect.USER32(?,?,0079C304), ref: 0079AEA0
                      • MessageBeep.USER32(00000000), ref: 0079AF11
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Rect$BeepClientMessageScreenWindow
                      • String ID:
                      • API String ID: 1352109105-0
                      • Opcode ID: fe56e2a125069742b6fa8c1811532b429687a3eec0705720960b7cac74380f8f
                      • Instruction ID: b10f39818adca6dd483528092e765ee8dabccaf886a9848dce0b4412259a428d
                      • Opcode Fuzzy Hash: fe56e2a125069742b6fa8c1811532b429687a3eec0705720960b7cac74380f8f
                      • Instruction Fuzzy Hash: 3C418E70602219EFCF11CF58E885B697BF6FB49350F1881AAE414CB251D738E842DF92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00771037
                      • SetKeyboardState.USER32(00000080,?,00000001), ref: 00771053
                      • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 007710B9
                      • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 0077110B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: KeyboardState$InputMessagePostSend
                      • String ID:
                      • API String ID: 432972143-0
                      • Opcode ID: 0c1f78422058ef4cafd7d0099a20a8783f5c84b217973a69e06361fd6a337d4f
                      • Instruction ID: 3705b56175b091b20653080c038c9e7a98610827d8a6dd75fe82a49616b353de
                      • Opcode Fuzzy Hash: 0c1f78422058ef4cafd7d0099a20a8783f5c84b217973a69e06361fd6a337d4f
                      • Instruction Fuzzy Hash: 5C315E30E40688AEFF308B6D8C097F9BBA5AB45350F84C21AE588521D1C37C89D5D765
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00771176
                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 00771192
                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 007711F1
                      • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00771243
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: KeyboardState$InputMessagePostSend
                      • String ID:
                      • API String ID: 432972143-0
                      • Opcode ID: a370f06c6611022b6350295db2b8ff22b42f497eab2a4bc4ce4fbbca50c4bfb7
                      • Instruction ID: 03e89e94832c9086ce23c4ed333dd1b4af00f17fc56f353bd389a1a75eef9c00
                      • Opcode Fuzzy Hash: a370f06c6611022b6350295db2b8ff22b42f497eab2a4bc4ce4fbbca50c4bfb7
                      • Instruction Fuzzy Hash: 8D312B30A4074C9AEF308A6D8C09BFA7B6AAB45350FD4C35BE688961D1C33C4D559755
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0074644B
                      • __isleadbyte_l.LIBCMT ref: 00746479
                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007464A7
                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007464DD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                      • String ID:
                      • API String ID: 3058430110-0
                      • Opcode ID: 55cb46b4549d4b54753341fa77c00ffa4866aa65e13c317b2bb7ab25d600431f
                      • Instruction ID: 9d5ca4341820a29cb1abc168bf0d1f92710f22c0ebb901b540f3c3ea3a42a2ba
                      • Opcode Fuzzy Hash: 55cb46b4549d4b54753341fa77c00ffa4866aa65e13c317b2bb7ab25d600431f
                      • Instruction Fuzzy Hash: 8B31EF31600286EFDF258F68C848BBA7BA5FF42310F154029F854871A1EB39DE90DB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetForegroundWindow.USER32 ref: 00795189
                        • Part of subcall function 0077387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00773897
                        • Part of subcall function 0077387D: GetCurrentThreadId.KERNEL32 ref: 0077389E
                        • Part of subcall function 0077387D: AttachThreadInput.USER32(00000000,?,007752A7), ref: 007738A5
                      • GetCaretPos.USER32(?), ref: 0079519A
                      • ClientToScreen.USER32(00000000,?), ref: 007951D5
                      • GetForegroundWindow.USER32 ref: 007951DB
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                      • String ID:
                      • API String ID: 2759813231-0
                      • Opcode ID: 10393c6d09630994aedec236798be1ab621376a61511951970ceaaa9334e30b8
                      • Instruction ID: 2b76878a89dbe46478079b7794dbfc6bf638154dfbed4934a79c8e63a08271a7
                      • Opcode Fuzzy Hash: 10393c6d09630994aedec236798be1ab621376a61511951970ceaaa9334e30b8
                      • Instruction Fuzzy Hash: 01311271900108AFDB00EFA9D8459EFB7F9EF58300F10806AE515E7251EA799E45CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00712612: GetWindowLongW.USER32(?,000000EB), ref: 00712623
                      • GetCursorPos.USER32(?), ref: 0079C7C2
                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0074BBFB,?,?,?,?,?), ref: 0079C7D7
                      • GetCursorPos.USER32(?), ref: 0079C824
                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0074BBFB,?,?,?), ref: 0079C85E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                      • String ID:
                      • API String ID: 2864067406-0
                      • Opcode ID: 43d4e3499973bd9b4227fc49754c5a663de4687906df1720a90d0e5284630dc5
                      • Instruction ID: 52fa5c6e0083d5d0b09544eb4c1db3be0484b0e7cf4b53d3a79c66b97f6c3266
                      • Opcode Fuzzy Hash: 43d4e3499973bd9b4227fc49754c5a663de4687906df1720a90d0e5284630dc5
                      • Instruction Fuzzy Hash: 58318375600018EFCF16CF58D898EEA7BB6EF49710F04816AF9058B2A1C7399D61DFA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __setmode.LIBCMT ref: 00730BF2
                        • Part of subcall function 00715B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00777B20,?,?,00000000), ref: 00715B8C
                        • Part of subcall function 00715B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00777B20,?,?,00000000,?,?), ref: 00715BB0
                      • _fprintf.LIBCMT ref: 00730C29
                      • OutputDebugStringW.KERNEL32(?), ref: 00766331
                        • Part of subcall function 00734CDA: _flsall.LIBCMT ref: 00734CF3
                      • __setmode.LIBCMT ref: 00730C5E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                      • String ID:
                      • API String ID: 521402451-0
                      • Opcode ID: b68f1f6fc62f58a935b99938d96de18e6f518b64e00438e772fdd21e5fde602e
                      • Instruction ID: 273edf671ab0970a73d597a29dad5b19fa3fbbf5ee7e23b61599810111bf1f19
                      • Opcode Fuzzy Hash: b68f1f6fc62f58a935b99938d96de18e6f518b64e00438e772fdd21e5fde602e
                      • Instruction Fuzzy Hash: 5411E772904208EAEB0877B89C4A9FE7B6D9F81320F14415AF204972D3DE2D6D8647E5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00768652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00768669
                        • Part of subcall function 00768652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00768673
                        • Part of subcall function 00768652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00768682
                        • Part of subcall function 00768652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00768689
                        • Part of subcall function 00768652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0076869F
                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00768BEB
                      • _memcmp.LIBCMT ref: 00768C0E
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00768C44
                      • HeapFree.KERNEL32(00000000), ref: 00768C4B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                      • String ID:
                      • API String ID: 1592001646-0
                      • Opcode ID: 129b68ac7587ed468eb818e77bbe4698921874b2587d8ff6819f2ff44c89c87b
                      • Instruction ID: a758fcfedb3a94a750fb9383a7f27c96c516153406235c6f963d9a5ed58f9db3
                      • Opcode Fuzzy Hash: 129b68ac7587ed468eb818e77bbe4698921874b2587d8ff6819f2ff44c89c87b
                      • Instruction Fuzzy Hash: 6B21B071E41208EFDB00CFA4C949BEEB7B8EF44340F148199E855A7241EB39AE06CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00781A97
                        • Part of subcall function 00781B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00781B40
                        • Part of subcall function 00781B21: InternetCloseHandle.WININET(00000000), ref: 00781BDD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Internet$CloseConnectHandleOpen
                      • String ID:
                      • API String ID: 1463438336-0
                      • Opcode ID: 5966eff8cd5ce55026ba8512bc34e572894300075014e46f56f9fd124abdf70f
                      • Instruction ID: 26dc3ecdfcc1ef96268ff8f5fc05d577cdef8445a4557f615b51483f64e4724c
                      • Opcode Fuzzy Hash: 5966eff8cd5ce55026ba8512bc34e572894300075014e46f56f9fd124abdf70f
                      • Instruction Fuzzy Hash: 0221F375281600BFDB15AF60CC04FBBBBADFF44701F50401AFA02D6651EB39D8129BA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 0076F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0076E1C4,?,?,?,0076EFB7,00000000,000000EF,00000119,?,?), ref: 0076F5BC
                        • Part of subcall function 0076F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 0076F5E2
                        • Part of subcall function 0076F5AD: lstrcmpiW.KERNEL32(00000000,?,0076E1C4,?,?,?,0076EFB7,00000000,000000EF,00000119,?,?), ref: 0076F613
                      • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0076EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0076E1DD
                      • lstrcpyW.KERNEL32(00000000,?), ref: 0076E203
                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,0076EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0076E237
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: lstrcmpilstrcpylstrlen
                      • String ID: cdecl
                      • API String ID: 4031866154-3896280584
                      • Opcode ID: d43de66846fa8bb3a8f6c228ff68d0d14b177a64df58b6c0ff01c270a90f7dc4
                      • Instruction ID: 3e112b6517eedb7b289f2b44c796f51df07b83f3e184d2363052ca0c026140ea
                      • Opcode Fuzzy Hash: d43de66846fa8bb3a8f6c228ff68d0d14b177a64df58b6c0ff01c270a90f7dc4
                      • Instruction Fuzzy Hash: 9C11D37A200305EFCB25AF64DC49D7A77A9FF44310B40802AFC07CB264EB799851C7A4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _free.LIBCMT ref: 00745351
                        • Part of subcall function 0073594C: __FF_MSGBANNER.LIBCMT ref: 00735963
                        • Part of subcall function 0073594C: __NMSG_WRITE.LIBCMT ref: 0073596A
                        • Part of subcall function 0073594C: RtlAllocateHeap.NTDLL(011D0000,00000000,00000001,00000000,?,?,?,00731013,?), ref: 0073598F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: AllocateHeap_free
                      • String ID:
                      • API String ID: 614378929-0
                      • Opcode ID: 4f3f75a9d7aac3db741208cc15c8a73b92a0e9fad0461d03ec91f0a1c76c15a1
                      • Instruction ID: 25c740eb81706a794f3889ec6c325ab597d7328abd2abe71e42795123213d365
                      • Opcode Fuzzy Hash: 4f3f75a9d7aac3db741208cc15c8a73b92a0e9fad0461d03ec91f0a1c76c15a1
                      • Instruction Fuzzy Hash: 4211E332504B15EFDB312F70EC0866D3B98AF143A4F24452AF9449A193DF7D8D418790
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 00714560
                        • Part of subcall function 0071410D: _memset.LIBCMT ref: 0071418D
                        • Part of subcall function 0071410D: _wcscpy.LIBCMT ref: 007141E1
                        • Part of subcall function 0071410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007141F1
                      • KillTimer.USER32(?,00000001,?,?), ref: 007145B5
                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007145C4
                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0074D6CE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                      • String ID:
                      • API String ID: 1378193009-0
                      • Opcode ID: 5ea8e4197acc6359931002e223d6d39c3c97d50362ba2dccfea8bce9876fc0b3
                      • Instruction ID: 84f8f3224344793708a3cc4a44b50dc433b04ad43e385150e343c8ed131d3984
                      • Opcode Fuzzy Hash: 5ea8e4197acc6359931002e223d6d39c3c97d50362ba2dccfea8bce9876fc0b3
                      • Instruction Fuzzy Hash: B721D770904784AFEB328B24DC59BE7BBED9F01304F04009EE6DE96282C77C5E859B52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 007740D1
                      • _memset.LIBCMT ref: 007740F2
                      • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00774144
                      • CloseHandle.KERNEL32(00000000), ref: 0077414D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CloseControlCreateDeviceFileHandle_memset
                      • String ID:
                      • API String ID: 1157408455-0
                      • Opcode ID: cd96a5cfc90b0d82c12efd8a9741ede050f5c920932f2cbafe7aeb35d809f433
                      • Instruction ID: 4c6793bce501e72fb96119e3dfedd46c3c3c19de4002c6b5be6d17608901b5cd
                      • Opcode Fuzzy Hash: cd96a5cfc90b0d82c12efd8a9741ede050f5c920932f2cbafe7aeb35d809f433
                      • Instruction Fuzzy Hash: 2E11CD7590122C7AD7305BA59C4DFABBB7CEF44760F1041D6F908D7180D6784E80CBA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00715B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00777B20,?,?,00000000), ref: 00715B8C
                        • Part of subcall function 00715B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00777B20,?,?,00000000,?,?), ref: 00715BB0
                      • gethostbyname.WSOCK32(?,?,?), ref: 007866AC
                      • WSAGetLastError.WSOCK32(00000000), ref: 007866B7
                      • _memmove.LIBCMT ref: 007866E4
                      • inet_ntoa.WSOCK32(?), ref: 007866EF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                      • String ID:
                      • API String ID: 1504782959-0
                      • Opcode ID: e9a415281c0efffe347b9cb59fa060917bb54a50d285602d103280f6c4e1f357
                      • Instruction ID: d3fc8cd618babb0f8e3bcb28273b8621da7b86f31940aaa0bb5581d73717b926
                      • Opcode Fuzzy Hash: e9a415281c0efffe347b9cb59fa060917bb54a50d285602d103280f6c4e1f357
                      • Instruction Fuzzy Hash: 4E118E75600508EFCB04FBA8DD9ADEEB7B8AF44310B148025F502A71A1DF38AE45CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00769043
                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00769055
                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0076906B
                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00769086
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID:
                      • API String ID: 3850602802-0
                      • Opcode ID: 2bf64babc0535b74ba3ce08b830c6243c8003d63cca9310492ee4402e71fe5b2
                      • Instruction ID: 720601547871c17b11c509f4c061d53eff7909df4d47f0c613d87c2963709cc3
                      • Opcode Fuzzy Hash: 2bf64babc0535b74ba3ce08b830c6243c8003d63cca9310492ee4402e71fe5b2
                      • Instruction Fuzzy Hash: 37115E79900219FFDB10DFA5CD84EADFB78FB48310F204095EA05B7250D6716E11DB94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00712612: GetWindowLongW.USER32(?,000000EB), ref: 00712623
                      • DefDlgProcW.USER32(?,00000020,?), ref: 007112D8
                      • GetClientRect.USER32(?,?), ref: 0074B84B
                      • GetCursorPos.USER32(?), ref: 0074B855
                      • ScreenToClient.USER32(?,?), ref: 0074B860
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Client$CursorLongProcRectScreenWindow
                      • String ID:
                      • API String ID: 4127811313-0
                      • Opcode ID: 8d8f84d163bbbd2e79911fde75684249fda2cee74cca2d378aef20874c603e42
                      • Instruction ID: c1b7001c29771f6bac1bce1f7b1b02524213fee5e3ed4e5e664cbc4465195984
                      • Opcode Fuzzy Hash: 8d8f84d163bbbd2e79911fde75684249fda2cee74cca2d378aef20874c603e42
                      • Instruction Fuzzy Hash: 89112835A01119EFCF10DF98D8899EE77B8FB05301F504456FA01EB291C738AA92CBA9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,007701FD,?,00771250,?,00008000), ref: 0077166F
                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,007701FD,?,00771250,?,00008000), ref: 00771694
                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,007701FD,?,00771250,?,00008000), ref: 0077169E
                      • Sleep.KERNEL32(?,?,?,?,?,?,?,007701FD,?,00771250,?,00008000), ref: 007716D1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CounterPerformanceQuerySleep
                      • String ID:
                      • API String ID: 2875609808-0
                      • Opcode ID: 10c64b202f5660e40d1e508dedc568a7a517d0e9497012543d94e8a29119b060
                      • Instruction ID: f3993b5cdf882606f796af5768de9c2a07c8ee950322d5160358a55b2e64851c
                      • Opcode Fuzzy Hash: 10c64b202f5660e40d1e508dedc568a7a517d0e9497012543d94e8a29119b060
                      • Instruction Fuzzy Hash: 46113C31C0151DDBCF009FA9D949AEEBB78FF09791F45805AE988F6240DF3855608BDA
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                      • String ID:
                      • API String ID: 3016257755-0
                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                      • Instruction ID: 86a3d6d3502afee28d42fb7e8785a56504c5861b142635eb01fcce1758755eec
                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                      • Instruction Fuzzy Hash: F401403604414AFBCF1A5E94CC458EE3F72BF59351B598615FA1898031D37BC9B1EB81
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetWindowRect.USER32(?,?), ref: 0079B59E
                      • ScreenToClient.USER32(?,?), ref: 0079B5B6
                      • ScreenToClient.USER32(?,?), ref: 0079B5DA
                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0079B5F5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ClientRectScreen$InvalidateWindow
                      • String ID:
                      • API String ID: 357397906-0
                      • Opcode ID: 4017a9f5a06949c3258826f2bc3c0f75cf5b442980aeee226be9669fd50f1e81
                      • Instruction ID: 31be814abc5302bd7ed204a48d5b16018b68095cccf8656d6916457fda1cdbe0
                      • Opcode Fuzzy Hash: 4017a9f5a06949c3258826f2bc3c0f75cf5b442980aeee226be9669fd50f1e81
                      • Instruction Fuzzy Hash: 041146B5D00209EFDB41CF99D544AEEFBB5FB08310F108166E914E3220D735AA658F54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 0079B8FE
                      • _memset.LIBCMT ref: 0079B90D
                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,007D7F20,007D7F64), ref: 0079B93C
                      • CloseHandle.KERNEL32 ref: 0079B94E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memset$CloseCreateHandleProcess
                      • String ID:
                      • API String ID: 3277943733-0
                      • Opcode ID: 319f4f8c5dadc680c90ecd5018f57a60039a6cb068e5907c033796cb271e38d5
                      • Instruction ID: 3067510d08f9e9f01e8cf76ed7dfee68f2b5bb6c920564034ce2a1d884531d60
                      • Opcode Fuzzy Hash: 319f4f8c5dadc680c90ecd5018f57a60039a6cb068e5907c033796cb271e38d5
                      • Instruction Fuzzy Hash: 5BF05EB2645304BBF2242771AC4AFBB3B6DEB08354F408032FA08D5292E77D5902C7AC
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • EnterCriticalSection.KERNEL32(?), ref: 00776E88
                        • Part of subcall function 0077794E: _memset.LIBCMT ref: 00777983
                      • _memmove.LIBCMT ref: 00776EAB
                      • _memset.LIBCMT ref: 00776EB8
                      • LeaveCriticalSection.KERNEL32(?), ref: 00776EC8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CriticalSection_memset$EnterLeave_memmove
                      • String ID:
                      • API String ID: 48991266-0
                      • Opcode ID: 8aaf17a149c609dc19a63dca1bb88fc4860098ac83073a54ba4e1b160513fa8c
                      • Instruction ID: e57f0b8569b0c65dbbfd2defbbae9bf62c455e1ad88825744a7e44d79972399f
                      • Opcode Fuzzy Hash: 8aaf17a149c609dc19a63dca1bb88fc4860098ac83073a54ba4e1b160513fa8c
                      • Instruction Fuzzy Hash: FDF0543A100204EBCF056F55DC89F4ABB2AEF45360F04C061FE089E217C739A911CBB5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 007112F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0071134D
                        • Part of subcall function 007112F3: SelectObject.GDI32(?,00000000), ref: 0071135C
                        • Part of subcall function 007112F3: BeginPath.GDI32(?), ref: 00711373
                        • Part of subcall function 007112F3: SelectObject.GDI32(?,00000000), ref: 0071139C
                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0079C030
                      • LineTo.GDI32(00000000,?,?), ref: 0079C03D
                      • EndPath.GDI32(00000000), ref: 0079C04D
                      • StrokePath.GDI32(00000000), ref: 0079C05B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                      • String ID:
                      • API String ID: 1539411459-0
                      • Opcode ID: 98e0fa51cddff0e0d0e59772338322add6c2c69aacb17e1535b73766d976b3dd
                      • Instruction ID: 94340b9f6f9f5e6db1cafbd62307f1f5ec9aff4bead391345773e84e6b2f15ba
                      • Opcode Fuzzy Hash: 98e0fa51cddff0e0d0e59772338322add6c2c69aacb17e1535b73766d976b3dd
                      • Instruction Fuzzy Hash: B2F05E31105259FBDF126F99AC0AFCE3F69AF05311F148002FA11A50E2C77D5662DBD9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0076A399
                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0076A3AC
                      • GetCurrentThreadId.KERNEL32 ref: 0076A3B3
                      • AttachThreadInput.USER32(00000000), ref: 0076A3BA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                      • String ID:
                      • API String ID: 2710830443-0
                      • Opcode ID: bd78623258671865141e1785ad2013430cb2c3201e0d517c84c2581fe45449b2
                      • Instruction ID: c4757c347f8e4358e1df9d3cd769425453e24a4ada284b1a617c66a3aec71dc5
                      • Opcode Fuzzy Hash: bd78623258671865141e1785ad2013430cb2c3201e0d517c84c2581fe45449b2
                      • Instruction Fuzzy Hash: AFE06D32141328BADB201FA2DC0CEDB3F2CEF167A1F008026FA0AD4060C679C541CBE5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetSysColor.USER32(00000008), ref: 00712231
                      • SetTextColor.GDI32(?,000000FF), ref: 0071223B
                      • SetBkMode.GDI32(?,00000001), ref: 00712250
                      • GetStockObject.GDI32(00000005), ref: 00712258
                      • GetWindowDC.USER32(?,00000000), ref: 0074C0D3
                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 0074C0E0
                      • GetPixel.GDI32(00000000,?,00000000), ref: 0074C0F9
                      • GetPixel.GDI32(00000000,00000000,?), ref: 0074C112
                      • GetPixel.GDI32(00000000,?,?), ref: 0074C132
                      • ReleaseDC.USER32(?,00000000), ref: 0074C13D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                      • String ID:
                      • API String ID: 1946975507-0
                      • Opcode ID: 3f8b4dcd06ee19c5d0f98cfc7ab88537de7e4fc9e6ab8ecb02e8acb2bc29fb2a
                      • Instruction ID: f8efa9a75c0cc46c695f04013ff97eb87bca1f726df3254be98ddbcf36078293
                      • Opcode Fuzzy Hash: 3f8b4dcd06ee19c5d0f98cfc7ab88537de7e4fc9e6ab8ecb02e8acb2bc29fb2a
                      • Instruction Fuzzy Hash: 52E06D32240248EADB215F68FC0D7D83B10EB06332F10C367FA69C80F1877949A2DB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetCurrentThread.KERNEL32 ref: 00768C63
                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,0076882E), ref: 00768C6A
                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0076882E), ref: 00768C77
                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,0076882E), ref: 00768C7E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CurrentOpenProcessThreadToken
                      • String ID:
                      • API String ID: 3974789173-0
                      • Opcode ID: 2a9cdacfb366a3bab3f8770bf77dc33e1c5fab4d2e7f73fd6626fbf1281ffe06
                      • Instruction ID: a1d0e7be9cabe1dbff3cf4898b36e9c28d15f1d98ce519d3787b610a165ef2e5
                      • Opcode Fuzzy Hash: 2a9cdacfb366a3bab3f8770bf77dc33e1c5fab4d2e7f73fd6626fbf1281ffe06
                      • Instruction Fuzzy Hash: C2E02672602210DBD7201FB06E0CB463FACEF50792F048829F646D9080DA3C8442CB31
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetDesktopWindow.USER32 ref: 00752187
                      • GetDC.USER32(00000000), ref: 00752191
                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007521B1
                      • ReleaseDC.USER32(?), ref: 007521D2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CapsDesktopDeviceReleaseWindow
                      • String ID:
                      • API String ID: 2889604237-0
                      • Opcode ID: e40b653a1db5ba38271a4523e417c51917c1946327ccd08bd5ec70f8cbf09e39
                      • Instruction ID: 6ce6c59fa9359d66d247ae9093101ed88c39ca45d0b3195d2beb3fcb3c6df069
                      • Opcode Fuzzy Hash: e40b653a1db5ba38271a4523e417c51917c1946327ccd08bd5ec70f8cbf09e39
                      • Instruction Fuzzy Hash: 88E0C275840604EFDB019FA4C808A9D7BA5AB48351F20C426E95AE6260CB7C81829F45
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetDesktopWindow.USER32 ref: 0075219B
                      • GetDC.USER32(00000000), ref: 007521A5
                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007521B1
                      • ReleaseDC.USER32(?), ref: 007521D2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CapsDesktopDeviceReleaseWindow
                      • String ID:
                      • API String ID: 2889604237-0
                      • Opcode ID: a225dfcec5fc49419869a9bceea1170dbf4731aaa2700aaf037c3be4ef7446a8
                      • Instruction ID: 4f2f68152c234b156ad3589429d1d3d11528e6ad47638baa17e6552ffd577f6c
                      • Opcode Fuzzy Hash: a225dfcec5fc49419869a9bceea1170dbf4731aaa2700aaf037c3be4ef7446a8
                      • Instruction Fuzzy Hash: E7E0E575800304AFCB019FA4C80869D7BA5AB4C310F20C426F95AE7260CB7C9142DF44
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID:
                      • String ID: %z
                      • API String ID: 0-3155352665
                      • Opcode ID: b6d37913951a7da5162ddd686b82d739df292bbd6b3c58e60f40e90d444eee36
                      • Instruction ID: dacd2b02c47ccb83bfeb61e1392cc03679d65d9fd0edf9061fd1be2feb36f760
                      • Opcode Fuzzy Hash: b6d37913951a7da5162ddd686b82d739df292bbd6b3c58e60f40e90d444eee36
                      • Instruction Fuzzy Hash: 0FB18C75900209DACF24EF9CC4859EEB7B9FF44310F50412AE902A72D5EB389ED6CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __itow_s
                      • String ID: xr}$xr}
                      • API String ID: 3653519197-1129111282
                      • Opcode ID: a0fad8c36614a66eef3427debdf578cc0140f35baf5352199b3915513c9dcb7a
                      • Instruction ID: c41daf1a2e102925d7e48ce4840862365fd3bd5321f4413075b511d24e2cbe9d
                      • Opcode Fuzzy Hash: a0fad8c36614a66eef3427debdf578cc0140f35baf5352199b3915513c9dcb7a
                      • Instruction Fuzzy Hash: B3B18270A40205EFDB14EF58C895DEEB7B9FF58300F148459F9459B292EB78E981CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 0072FEC6: _wcscpy.LIBCMT ref: 0072FEE9
                        • Part of subcall function 00719997: __itow.LIBCMT ref: 007199C2
                        • Part of subcall function 00719997: __swprintf.LIBCMT ref: 00719A0C
                      • __wcsnicmp.LIBCMT ref: 0077B298
                      • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0077B361
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                      • String ID: LPT
                      • API String ID: 3222508074-1350329615
                      • Opcode ID: 81105efe04b67d301edb1e5a0e7d0b26c9413090f4e2079c089f6a2ae87bd447
                      • Instruction ID: c2d4103b291a5b76770c881614edbfd62d5b581589c5e7b666c7ad08e917ed9f
                      • Opcode Fuzzy Hash: 81105efe04b67d301edb1e5a0e7d0b26c9413090f4e2079c089f6a2ae87bd447
                      • Instruction Fuzzy Hash: C9617475A00215EFDF14DF98C895FAEB7B4EF08350F11806AF54AAB291D778AE81CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: Oar
                      • API String ID: 4104443479-1181374745
                      • Opcode ID: 4a22dd31e8c84695dab09dd596700991f57f119b0e5a392e41e06bbb1dcf854f
                      • Instruction ID: f877d0af22ee3e734802dc920c6a95e48e1faf8ce998a63334292bf67edc48b4
                      • Opcode Fuzzy Hash: 4a22dd31e8c84695dab09dd596700991f57f119b0e5a392e41e06bbb1dcf854f
                      • Instruction Fuzzy Hash: E65193B0A00619DFCF64CF68D880AEEB7F5FF44305F14852AE85AE7240DB78A959CB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • Sleep.KERNEL32(00000000), ref: 00722AC8
                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 00722AE1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: GlobalMemorySleepStatus
                      • String ID: @
                      • API String ID: 2783356886-2766056989
                      • Opcode ID: 92fd576a1b39ab2714848a76bc7ce07da4ef810bf390881b836b1d5aa6536ddd
                      • Instruction ID: ef0fba987fb47297f743402821b2067edf5ff459656ed68fc33b18d4660635c8
                      • Opcode Fuzzy Hash: 92fd576a1b39ab2714848a76bc7ce07da4ef810bf390881b836b1d5aa6536ddd
                      • Instruction Fuzzy Hash: BD515771418745DBD320AF14D89ABAFBBE8FF84310F42885DF2D9511A1DB38856ACB26
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 0071506B: __fread_nolock.LIBCMT ref: 00715089
                      • _wcscmp.LIBCMT ref: 00779AAE
                      • _wcscmp.LIBCMT ref: 00779AC1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: _wcscmp$__fread_nolock
                      • String ID: FILE
                      • API String ID: 4029003684-3121273764
                      • Opcode ID: 65a13efbb0960fcafd3de364793e6eaff91191a83f082d4c12f06433c0fa2cd7
                      • Instruction ID: 706299e1fc9d75930db1e925b997d36baff297a4a728d681bba2b6b3bcb0ecc9
                      • Opcode Fuzzy Hash: 65a13efbb0960fcafd3de364793e6eaff91191a83f082d4c12f06433c0fa2cd7
                      • Instruction Fuzzy Hash: 06410BB1A00609FADF209AE4DC4AFEFB7BDDF49710F004079FA04A71C1D679AA4487A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ClearVariant
                      • String ID: Dt}$Dt}
                      • API String ID: 1473721057-2180860347
                      • Opcode ID: ef23ed300061f34ddba4004e1f9dcd588e231cc1c98ef6c06e545b6d65b83731
                      • Instruction ID: 7f5dd92c8dedcfd6c3af3e4a558e8b276e14807bab1643bc7e56fe5437dd20db
                      • Opcode Fuzzy Hash: ef23ed300061f34ddba4004e1f9dcd588e231cc1c98ef6c06e545b6d65b83731
                      • Instruction Fuzzy Hash: 0D5117B4609342DFC754CF18C480A9ABBF1BF99354F54885DE9858B3A1E379EC85CB82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 00782892
                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 007828C8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CrackInternet_memset
                      • String ID: |
                      • API String ID: 1413715105-2343686810
                      • Opcode ID: 7cb02b4c8c76cca53ccd395e04660c3409986107b1389cb89913c15bcf0922c0
                      • Instruction ID: de7028be789ddba2f6e73a95986df196fb819e0c9c9830ce1d2363ea55221406
                      • Opcode Fuzzy Hash: 7cb02b4c8c76cca53ccd395e04660c3409986107b1389cb89913c15bcf0922c0
                      • Instruction Fuzzy Hash: 28311A71800119EFCF05AFA5CC89EEEBFB9FF08300F104029F815A6166DB355A96DB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DestroyWindow.USER32(?,?,?,?), ref: 00796D86
                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00796DC2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$DestroyMove
                      • String ID: static
                      • API String ID: 2139405536-2160076837
                      • Opcode ID: d7c8a22573813a9451c523529a652bbf95571d87506aa9352d1e24a7a1c2b8d3
                      • Instruction ID: edca03094a7aa0f19151e492f15750da4d99c126ac976333a3369f056038025d
                      • Opcode Fuzzy Hash: d7c8a22573813a9451c523529a652bbf95571d87506aa9352d1e24a7a1c2b8d3
                      • Instruction Fuzzy Hash: 70319C71210604AADF109F68EC84AFB77B9FF48720F508619F9A5D7190DA39AC91CB64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 00772E00
                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00772E3B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: InfoItemMenu_memset
                      • String ID: 0
                      • API String ID: 2223754486-4108050209
                      • Opcode ID: d5c066a720178c783e94dd14416ca9a67860bb80a0d34b57132a15890066db81
                      • Instruction ID: 0510371890718ff711eebfe727d9cc40f9ce50faa9b5a082fde5263c4176fb85
                      • Opcode Fuzzy Hash: d5c066a720178c783e94dd14416ca9a67860bb80a0d34b57132a15890066db81
                      • Instruction Fuzzy Hash: 0731EB31600305DBEF248F54C849BAE7BB5FF05390F24802EE9E9D61A2D7B89942CB55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 007969D0
                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007969DB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: Combobox
                      • API String ID: 3850602802-2096851135
                      • Opcode ID: 6f4aaf76ebae4f7c29769e07a1a0b6ab7e1703c211ed5623d5e3796042512e5d
                      • Instruction ID: d6b0ec9ade24d55c8b12cde219737e64da4372a1e590a827d2905d63654a62f3
                      • Opcode Fuzzy Hash: 6f4aaf76ebae4f7c29769e07a1a0b6ab7e1703c211ed5623d5e3796042512e5d
                      • Instruction Fuzzy Hash: 5C11C871700208AFEF119F14EC91FFB376EEB993B4F114229F95897290D679AC5187A0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00711D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00711D73
                        • Part of subcall function 00711D35: GetStockObject.GDI32(00000011), ref: 00711D87
                        • Part of subcall function 00711D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00711D91
                      • GetWindowRect.USER32(00000000,?), ref: 00796EE0
                      • GetSysColor.USER32(00000012), ref: 00796EFA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                      • String ID: static
                      • API String ID: 1983116058-2160076837
                      • Opcode ID: 4435e44aee9369eeca13aa1dcb738636c4e491e9d495c492fe57550651007652
                      • Instruction ID: 7dfedeaeb7c54e0dc08ed3086615c8a602ecb6cfc55f8902a1a5921ad9c594d7
                      • Opcode Fuzzy Hash: 4435e44aee9369eeca13aa1dcb738636c4e491e9d495c492fe57550651007652
                      • Instruction Fuzzy Hash: 5221267261020AAFDF04DFA8ED45AEA7BB9FB08314F054629F955D3250E638E8619B60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetWindowTextLengthW.USER32(00000000), ref: 00796C11
                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00796C20
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: LengthMessageSendTextWindow
                      • String ID: edit
                      • API String ID: 2978978980-2167791130
                      • Opcode ID: 4cc86fa58762f84cd20454cd3b9fd03490f8780f48062ea0ff9cdb46f6acbb47
                      • Instruction ID: 8cb69ffc2326391003612ddc1a8fc05b9c8acec2ebd040b4fbd90a43287bd440
                      • Opcode Fuzzy Hash: 4cc86fa58762f84cd20454cd3b9fd03490f8780f48062ea0ff9cdb46f6acbb47
                      • Instruction Fuzzy Hash: 7C11BCB1100208ABEF108F64EC45EEB3B69EB05378F604724FA60D71E0D739EC919B60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _memset.LIBCMT ref: 00772F11
                      • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00772F30
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: InfoItemMenu_memset
                      • String ID: 0
                      • API String ID: 2223754486-4108050209
                      • Opcode ID: 2928f24332f9db02196e8cf4ed6bf86ed355857d72f8dcc15b5a8a987584f327
                      • Instruction ID: 8bd058139bfde1e6f39709fc91014f214af5e1fbad49b24d8f9a300277d32c02
                      • Opcode Fuzzy Hash: 2928f24332f9db02196e8cf4ed6bf86ed355857d72f8dcc15b5a8a987584f327
                      • Instruction Fuzzy Hash: 1411B231901214ABDF24DB58DC48F9977B9EB05390F14C0B6E868A72A2D7B8AD06C795
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00782520
                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00782549
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Internet$OpenOption
                      • String ID: <local>
                      • API String ID: 942729171-4266983199
                      • Opcode ID: 0bd90ef4d4bd6eed427ec9667158560bdf066cf7b7d11e8cd1178b5518075520
                      • Instruction ID: 3905cfa481db5cd216fc579ae999f75e2e7980c9501b882a6ee63c22a3eb976a
                      • Opcode Fuzzy Hash: 0bd90ef4d4bd6eed427ec9667158560bdf066cf7b7d11e8cd1178b5518075520
                      • Instruction Fuzzy Hash: C311C6B05C1225BADB24AF518C99EBBFF68FF06752F10816AF90586041D2785D62D7F0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 0078830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,007880C8,?,00000000,?,?), ref: 00788322
                      • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 007880CB
                      • htons.WSOCK32(00000000,?,00000000), ref: 00788108
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ByteCharMultiWidehtonsinet_addr
                      • String ID: 255.255.255.255
                      • API String ID: 2496851823-2422070025
                      • Opcode ID: 6892e66cf92d8c8c470b357575b621733e6d15ab440648eee4c7462f654cbd80
                      • Instruction ID: 53904705ae8efda5ab111af1c20fa084a8b9b051d8f9eed8da72c20e04a5bcc6
                      • Opcode Fuzzy Hash: 6892e66cf92d8c8c470b357575b621733e6d15ab440648eee4c7462f654cbd80
                      • Instruction Fuzzy Hash: F711A574540209EBDB20AFA4CC8AFEDB764FF44310F50852BE911972D1DF75A815C796
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00713C26,007D62F8,?,?,?), ref: 00720ACE
                        • Part of subcall function 00717D2C: _memmove.LIBCMT ref: 00717D66
                      • _wcscat.LIBCMT ref: 007550E1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: FullNamePath_memmove_wcscat
                      • String ID: c}
                      • API String ID: 257928180-2220204409
                      • Opcode ID: 998fc1f3e53bc5568d32445ce2743ef2912e774949f89535b258b06b63546b43
                      • Instruction ID: 59d5334083f624ae1f480509fc0c948590523e0f14b039398b0c61d8b424dc03
                      • Opcode Fuzzy Hash: 998fc1f3e53bc5568d32445ce2743ef2912e774949f89535b258b06b63546b43
                      • Instruction Fuzzy Hash: CF116975A0421CDB8B50EBB4EC45DD977B8FF08350B0040A6B988D7292DA7CDAC49765
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                        • Part of subcall function 0076B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0076B0E7
                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00769355
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ClassMessageNameSend_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 372448540-1403004172
                      • Opcode ID: 3322a4daf3f475955bba424a9743c3d2f36b8580d01d3394cab23b3b75453820
                      • Instruction ID: fa2dcf6e0eca22e7b4d6482bf4773168602817e566ed11b98c1b3bd955c298f7
                      • Opcode Fuzzy Hash: 3322a4daf3f475955bba424a9743c3d2f36b8580d01d3394cab23b3b75453820
                      • Instruction Fuzzy Hash: A901DE71A41214EB8B08EBA4CC9ACFE776DBF06320B100619FA33A73D1DB3959488650
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                        • Part of subcall function 0076B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0076B0E7
                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 0076924D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ClassMessageNameSend_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 372448540-1403004172
                      • Opcode ID: 0be4d963b15bf48f1e6074cf07041bdb348041689be3560e086d08acfc0eb6ef
                      • Instruction ID: a59a6cd44dce39c89db3a2b9203f8f0cce3ad9660e2f459fd6710b570d6587d0
                      • Opcode Fuzzy Hash: 0be4d963b15bf48f1e6074cf07041bdb348041689be3560e086d08acfc0eb6ef
                      • Instruction Fuzzy Hash: 31018471A41204FBCB08EBA4C9AAEFF77ACAF45300F140119BA13672C1EB295F5C9671
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00717F41: _memmove.LIBCMT ref: 00717F82
                        • Part of subcall function 0076B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0076B0E7
                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 007692D0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ClassMessageNameSend_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 372448540-1403004172
                      • Opcode ID: cca1f2a91e1a326254d23d6f9ea6d9fa3aba424e9e55467c5d57b088dfc370a1
                      • Instruction ID: ed9ebf648d2ba1a296e96e1eaee9ae4c92cd22defa322f8cd9489f0ee16d22f4
                      • Opcode Fuzzy Hash: cca1f2a91e1a326254d23d6f9ea6d9fa3aba424e9e55467c5d57b088dfc370a1
                      • Instruction Fuzzy Hash: 56014471A41104FBCB04E6A4C996EEF77ACAF15300B144119BD13A32C1DA295E5D9665
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: __calloc_crt
                      • String ID: @R}
                      • API String ID: 3494438863-702703237
                      • Opcode ID: 3bc3cf847315747f759569025fb18f95ff3dc08da6a73520bf998a27ba5ac19b
                      • Instruction ID: 074ccf1cd24bfeb967b45c69ff64c598603330b93b24d62abbec0a4bd3519787
                      • Opcode Fuzzy Hash: 3bc3cf847315747f759569025fb18f95ff3dc08da6a73520bf998a27ba5ac19b
                      • Instruction Fuzzy Hash: 3DF0627135A716BBFB24DF59FD05B6127A5F710720F10C43BF140CA296EB3CA8818699
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: ClassName_wcscmp
                      • String ID: #32770
                      • API String ID: 2292705959-463685578
                      • Opcode ID: c71fd2a90955572ad2bd697e356ba733c99ff2e6c635be14576efd9f47be4296
                      • Instruction ID: 8e17bf845bff2090df9e261768163578926512da2bfcee5e7eef5cc236542afb
                      • Opcode Fuzzy Hash: c71fd2a90955572ad2bd697e356ba733c99ff2e6c635be14576efd9f47be4296
                      • Instruction Fuzzy Hash: A6E06872A0022C2BE720AB99AC4AFA7F7ECFB40771F00006BFD14D3041E5689A158BE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 007681CA
                        • Part of subcall function 00733598: _doexit.LIBCMT ref: 007335A2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: Message_doexit
                      • String ID: AutoIt$Error allocating memory.
                      • API String ID: 1993061046-4017498283
                      • Opcode ID: 3cbf140f1134003da54af468a9a94c6e74e1dd1ab879410aac66a5e993f6946e
                      • Instruction ID: 5331548cc87b6c05462ea27bd1c9f7f3d29a78ce99fec041e15d0f19c5f691e3
                      • Opcode Fuzzy Hash: 3cbf140f1134003da54af468a9a94c6e74e1dd1ab879410aac66a5e993f6946e
                      • Instruction Fuzzy Hash: 66D05B323C535872E25832B96C0FFC676884B05B52F44402AFB08955D38DDD55D242ED
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 0074B564: _memset.LIBCMT ref: 0074B571
                        • Part of subcall function 00730B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0074B540,?,?,?,0071100A), ref: 00730B89
                      • IsDebuggerPresent.KERNEL32(?,?,?,0071100A), ref: 0074B544
                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0071100A), ref: 0074B553
                      Strings
                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0074B54E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1676736422.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                      • Associated: 00000000.00000002.1676717899.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.000000000079F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676825275.00000000007C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676869033.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1676894815.00000000007E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_710000_PDT_7367027738832_789257820__________________________.jbxd
                      Similarity
                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                      • API String ID: 3158253471-631824599
                      • Opcode ID: 44e3f56a4f44e01ee77d92b72a610fcdafe6e91f342850534beded644f529267
                      • Instruction ID: 5a23db2c037dfb0b9eaeb50bed38e3e2e760c0ef867b2abe61ae6e943e847298
                      • Opcode Fuzzy Hash: 44e3f56a4f44e01ee77d92b72a610fcdafe6e91f342850534beded644f529267
                      • Instruction Fuzzy Hash: 4FE06DB02003108BD320DF29D808386FBE0BB04754F00892DE446C2651D7BCE845CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%